ld_preload userland rootkit
☆35Dec 13, 2020Updated 5 years ago
Alternatives and similar repositories for rkorova
Users that are interested in rkorova are comparing it to the libraries listed below
Sorting:
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Mar 3, 2026Updated last week
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Code to scrape and parse documents in The American Presidency Project☆11Mar 28, 2018Updated 7 years ago
- Althttpd is a simple webserver that has run the https://sqlite.org/ website since 2004. Althttpd strives for simplicity, security, and lo…☆11Jun 12, 2021Updated 4 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Aug 27, 2017Updated 8 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- https://mimesniff.spec.whatwg.org/ implementation for Python☆13Jan 16, 2024Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 5 months ago
- ☆13Feb 8, 2019Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago