rek7 / fireELFLinks
fireELF - Fileless Linux Malware Framework
☆677Updated 6 years ago
Alternatives and similar repositories for fireELF
Users that are interested in fireELF are comparing it to the libraries listed below
Sorting:
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆545Updated 4 years ago
- AntiVirus Evasion Tool☆1,738Updated 8 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆527Updated 4 years ago
- Malware sample library.☆590Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,131Updated 4 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,416Updated 5 years ago
- This is the list of all rootkits found so far on github and other sites.☆1,407Updated 4 months ago
- Payload Development Kit☆826Updated 3 weeks ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- A WebSocket C2 Tool☆410Updated 8 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆456Updated 3 months ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- mXtract - Memory Extractor & Analyzer☆589Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Updated 8 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,303Updated 3 years ago
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- HTA encryption tool for RedTeams☆1,421Updated 3 years ago
- PowerShell ReverseTCP Shell - Framework☆1,062Updated 3 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆653Updated last year
- Open source pre-operation C2 server based on python and powershell☆759Updated 4 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- a summary of linux rootkits published on GitHub☆191Updated 5 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆930Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆625Updated 3 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago