Linux PAM Backdoor
☆364Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for linux-pam-backdoor
Users that are interested in linux-pam-backdoor are comparing it to the libraries listed below
Sorting:
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆271Jun 8, 2023Updated 2 years ago
- eBPF hacks☆197Dec 12, 2024Updated last year
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,607Jul 10, 2023Updated 2 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- awesome-linux-rootkits☆2,032Feb 15, 2026Updated 2 weeks ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆441Jan 5, 2025Updated last year
- ☆33Aug 14, 2020Updated 5 years ago
- Monitor linux processes without root permissions☆5,902Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,429Jul 20, 2024Updated last year
- New generation of wmiexec.py☆1,264Jan 5, 2026Updated 2 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆300Feb 27, 2026Updated last week
- A collaborative, multi-platform, red teaming framework☆4,333Feb 19, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆10,759Updated this week
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,191Sep 10, 2020Updated 5 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- Windows Exploit Suggester - Next Generation☆4,766Feb 27, 2026Updated last week
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,854Dec 25, 2023Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,268Feb 20, 2026Updated 2 weeks ago
- Defeating Windows User Account Control☆7,404Feb 17, 2026Updated 2 weeks ago
- ☆314May 16, 2022Updated 3 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆106Nov 15, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Extract credentials from lsass remotely☆2,180Dec 24, 2025Updated 2 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,625Jul 18, 2024Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,488Jan 10, 2025Updated last year
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago