nsarlin / BackdoorLinux
Small Backdoor/rootkit for linux kernel
☆21Updated 11 years ago
Alternatives and similar repositories for BackdoorLinux:
Users that are interested in BackdoorLinux are comparing it to the libraries listed below
- ☆34Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated last year
- shell over icmp☆31Updated 11 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 7 years ago
- Juniper backdoor☆13Updated 9 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- ☆20Updated last year
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- Small modification version of p0wnedShell☆40Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆21Updated 11 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Projects and POCs☆59Updated 10 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Simple, useful scripts for red/blue team situations☆22Updated 9 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- ☆54Updated 7 years ago