The most small and fast solution to create a undetectable backdoor through the PAM module.
☆45Apr 13, 2018Updated 8 years ago
Alternatives and similar repositories for pambd
Users that are interested in pambd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 months ago
- "its like OAB in python because snake"☆17Feb 5, 2018Updated 8 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 9 years ago
- A port of the Python subprocess module to Lua☆18Nov 1, 2018Updated 7 years ago
- Runs sshd as a unprivileged user for persistence☆10Jun 23, 2019Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- Ansible Playbooks mainly for SmartOS Joyent/LX Zones☆11Feb 1, 2019Updated 7 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- HTML Form generator from Go structs☆12Jul 6, 2018Updated 7 years ago
- Network monitoring probe with plugins for anomaly detection☆12Sep 20, 2019Updated 6 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20May 2, 2017Updated 9 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Multi-threading wget golang☆13Mar 13, 2024Updated 2 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Scanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter☆12May 9, 2023Updated 3 years ago
- The CLI version of MEGAJS☆12Apr 16, 2024Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆40May 23, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- Experiments on Linux Assembly shellcodes injection☆13Nov 21, 2017Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- Golang specific ELF reader/parser CLI tool☆31Apr 17, 2017Updated 9 years ago
- ☆10Aug 18, 2021Updated 4 years ago