A shell script that mimics sudo and sends you back the password
☆45Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for sudo-backdoor
Users that are interested in sudo-backdoor are comparing it to the libraries listed below
Sorting:
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- Raycaster (C++)☆23Jun 28, 2025Updated 8 months ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- A Grand Sumo prediction game☆10Mar 11, 2026Updated last week
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆33Dec 7, 2025Updated 3 months ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Aug 6, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- ☆37May 8, 2022Updated 3 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- Script to Install Sudo Root on Android Termux (ROOT REQUIRED)☆11Aug 18, 2018Updated 7 years ago
- Simple Camera for Android.☆19Sep 2, 2025Updated 6 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Framework for writing UEFI applications☆18Sep 17, 2022Updated 3 years ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- Software Rasterizer (C++)☆40Jan 1, 2026Updated 2 months ago
- MS17-010 Tester☆13May 20, 2017Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- CVE-2023-20198 Checkscript☆20Oct 23, 2023Updated 2 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago