nsarlin / BackdoorLinuxLinks
Small Backdoor/rootkit for linux kernel
☆21Updated 11 years ago
Alternatives and similar repositories for BackdoorLinux
Users that are interested in BackdoorLinux are comparing it to the libraries listed below
Sorting:
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 8 years ago
- Small modification version of p0wnedShell☆40Updated 9 years ago
- source&exe☆38Updated 8 years ago
- All about the remote administrative tools☆37Updated 10 years ago
- ☆35Updated 9 years ago
- shell over icmp☆34Updated 12 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 8 years ago
- ☆55Updated 8 years ago
- Juniper backdoor☆14Updated 10 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 8 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 12 years ago
- [Windows] Local Privilege Escalation - WebClient☆59Updated 8 years ago
- A remote access trojan over DNS☆97Updated 10 years ago
- proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerability☆47Updated 6 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- powershell to hide process by kd.exe☆31Updated 4 years ago
- CVE-2017-9791☆27Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 12 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 8 years ago
- Support x86 and x64☆66Updated 4 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- MS17-010 exploits, payloads, and scanners☆97Updated 8 years ago
- Metasploit Framework☆25Updated 5 years ago
- Metasploit Framework☆31Updated 5 years ago