Unix remote login tool, rootkit shell tool
☆32Jun 11, 2015Updated 10 years ago
Alternatives and similar repositories for q-shell
Users that are interested in q-shell are comparing it to the libraries listed below
Sorting:
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Ring3 Rootkit Backdoor.☆43Jul 20, 2015Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- POSHSPY backdoor code☆47Apr 4, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago