msantos / sodsLinks
Socket over DNS tunnel
☆80Updated 5 years ago
Alternatives and similar repositories for sods
Users that are interested in sods are comparing it to the libraries listed below
Sorting:
- blocking socket library with SSL, SOCKS/HTTP proxy chaining, and timeout☆41Updated 3 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆205Updated 2 months ago
- ELF binary infector☆32Updated 14 years ago
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆54Updated 9 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆122Updated 6 months ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆105Updated 9 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- ☆36Updated 12 years ago
- DeNiSe is a proof of concept for tunneling TCP over DNS in Python☆29Updated 3 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Updated 11 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Updated 16 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- Linux v4.x.x Rootkit☆90Updated 10 months ago
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- Inject shellcode into running processes in Linux.☆43Updated 10 months ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- source code audit tool☆48Updated 4 years ago
- LD_PRELOAD rootkit detection & research.☆10Updated 8 years ago
- ☆81Updated 11 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago