pathtofile / commandline_cloaking
A collection of projects demonstrating various commandline cloaking techniques on Linux
☆57Updated 2 years ago
Alternatives and similar repositories for commandline_cloaking:
Users that are interested in commandline_cloaking are comparing it to the libraries listed below
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆72Updated 4 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆29Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆99Updated 2 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆61Updated 4 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Mara is a userland pty/tty sniffer☆53Updated last year
- ☆47Updated 2 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- GoLang binary pclntab mangler☆14Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Is this IP a C2 server?☆28Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year