monsieurPale / RSA-BackdoorLinks
Generate backdoored RSA keys using SETUP
☆219Updated 3 weeks ago
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below
Sorting:
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆67Updated 4 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated 11 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆352Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆256Updated 2 months ago
- ☆157Updated 6 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated this week
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆45Updated 2 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- Convert your shellcode into an ASCII string☆125Updated 6 months ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆206Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆163Updated 4 months ago
- Enumerate active EDR's on the system☆148Updated 3 months ago
- Proof of concept & details for CVE-2025-21298☆190Updated 11 months ago
- Payload encoding utility to effectively lower payload entropy.☆120Updated 8 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- Execute shellcode via ASPNET compiler☆59Updated 2 months ago
- Collection of codes focused on Linux rootkits☆187Updated 2 months ago
- This is practice VM for malware development☆170Updated last month
- ☆164Updated last month
- Obex – Blocking unwanted DLLs in user mode☆277Updated 3 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆259Updated 2 months ago
- ☆108Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- Stage 0☆168Updated last year
- Permanently disable EDRs as local admin☆122Updated last week