nisay759 / sudo-backdoorLinks
A shell script that mimics sudo and sends you back the password
☆43Updated 2 years ago
Alternatives and similar repositories for sudo-backdoor
Users that are interested in sudo-backdoor are comparing it to the libraries listed below
Sorting:
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 4 years ago
- PowerShell payload generator☆118Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Some random tools I use for penetration testing☆89Updated 7 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆113Updated last year
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 3 months ago
- Exploit Pack - Project☆72Updated 6 years ago
- Random Exploits☆50Updated 2 years ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 7 months ago
- Custom Metasploit logos☆54Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- cross-platform C2 framework in python 2☆39Updated 3 years ago