redcode-labs / SolarisLinks
A local LKM rootkit loader/dropper that lists available security mechanisms
☆52Updated 4 years ago
Alternatives and similar repositories for Solaris
Users that are interested in Solaris are comparing it to the libraries listed below
Sorting:
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Updated last year
- ☆66Updated 2 years ago
- ☆55Updated 4 years ago
- Malicious DLL Generator in Py3☆27Updated 5 years ago
- AMSI Bypass Via the Heap☆107Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated last year
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 6 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Shellcode injector using direct syscalls☆123Updated 5 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago