nopn0p / rkorova
ld_preload userland rootkit
☆34Updated 4 years ago
Alternatives and similar repositories for rkorova
Users that are interested in rkorova are comparing it to the libraries listed below
Sorting:
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- ☆24Updated 6 years ago
- ☆65Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A collection of shellcodes☆68Updated 13 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- ☆17Updated 6 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- ☆19Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Updated 10 months ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago