monsieurPale / RSA-BackdoorLinks
Generate backdoored RSA keys using SETUP
☆226Updated last month
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below
Sorting:
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Updated 3 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆356Updated 4 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆144Updated 11 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆209Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆67Updated 5 months ago
- This is practice VM for malware development☆174Updated 2 months ago
- Payload encoding utility to effectively lower payload entropy.☆121Updated 9 months ago
- Execute shellcode via ASPNET compiler☆60Updated 3 months ago
- ☆161Updated 7 months ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- Enumerate active EDR's on the system☆148Updated 3 months ago
- Obex – Blocking unwanted DLLs in user mode☆278Updated 3 months ago
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Stage 0☆169Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 5 months ago
- Proof of concept & details for CVE-2025-21298☆193Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆135Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated last year
- ☆163Updated last month
- Analyse MSI files for vulnerabilities☆140Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- The different ways to dump lsass☆204Updated 5 months ago