pathtofile / commandline_cloaking
A collection of projects demonstrating various commandline cloaking techniques on Linux
☆57Updated 2 years ago
Alternatives and similar repositories for commandline_cloaking:
Users that are interested in commandline_cloaking are comparing it to the libraries listed below
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 2 years ago
- Execute MachO binaries in memory using CGo☆79Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- kubernetes rootkit☆31Updated last year
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆29Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- POC for CVE-2022-23648☆36Updated 2 years ago
- Loads a program into a memfd and runs it.☆12Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated last year
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆18Updated 4 months ago
- ☆38Updated 2 years ago
- ☆16Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated last year
- TypeScript/JavaScript client libraries for Sliver☆20Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- If you have any questions, please open an issue.☆24Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 3 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- ☆42Updated 2 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year