ociredefz / pambdLinks
The most small and fast solution to create a undetectable backdoor through the PAM module.
☆45Updated 7 years ago
Alternatives and similar repositories for pambd
Users that are interested in pambd are comparing it to the libraries listed below
Sorting:
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆154Updated 9 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- Linux privilege escalation via LXD☆141Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- Mimipenguin密码抓取神器☆26Updated 8 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆135Updated 10 years ago
- simple shellcode generator☆114Updated 8 years ago
- Porting for Metasploit of the infamous Esteemaudit RDP Exploit☆111Updated 8 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Linux Local Enumeration Script☆79Updated 5 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A Upnp exploitation tool.☆107Updated 6 years ago
- hexadecimal & URL encoder + decoder☆76Updated 8 years ago
- A simple tool to convert the IP to a DWORD IP☆143Updated 3 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- ☆166Updated 6 years ago
- ☆83Updated 11 years ago
- ☆40Updated 10 years ago