redcode-labs / SolarisLinks
A local LKM rootkit loader/dropper that lists available security mechanisms
☆52Updated 4 years ago
Alternatives and similar repositories for Solaris
Users that are interested in Solaris are comparing it to the libraries listed below
Sorting:
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆46Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Updated last year
- Initial Commit of Coresploit☆57Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- ☆27Updated 5 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated last year
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Raw socket library/framework for red team events☆33Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 4 years ago
- ☆55Updated 4 years ago
- pypykatz plugin for volatility3 framework☆46Updated 8 months ago