rtsisyk / linux-iptables-contrack-exploitLinks
Bypass the Linux Netfilter using conntrack helpers
☆24Updated 10 years ago
Alternatives and similar repositories for linux-iptables-contrack-exploit
Users that are interested in linux-iptables-contrack-exploit are comparing it to the libraries listed below
Sorting:
- Repository containing many useful scripts☆74Updated 3 years ago
- HP printer security research code☆91Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- HP printer security research code☆54Updated 7 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year
- ☆73Updated 6 years ago
- ☆92Updated 7 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- ☆81Updated 11 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆135Updated 5 years ago
- public exploits☆35Updated 2 years ago
- ☆52Updated 6 years ago
- Credentials recovery project☆10Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 12 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆72Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆65Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 10 months ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- ☆33Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Mikrotik SMB buffer overflow exploit☆65Updated 7 years ago