Linux PAM Backdoor
☆375Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for linux-pam-backdoor
Users that are interested in linux-pam-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAM Backdoor☆33Mar 29, 2023Updated 3 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆272Jun 8, 2023Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,325Apr 27, 2026Updated 3 weeks ago
- eBPF hacks☆195Dec 12, 2024Updated last year
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Monitor linux processes without root permissions☆6,018Mar 1, 2026Updated 2 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- awesome-linux-rootkits☆2,065Feb 15, 2026Updated 3 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆238Sep 12, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,446Jul 20, 2024Updated last year
- Exploits for the TryHackMe room hackerNote☆33Feb 20, 2020Updated 6 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A small reverse shell for Linux & Windows☆639Jun 5, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆451Jan 5, 2025Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,908May 3, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated last week
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- Various *nix tools built as statically-linked binaries☆3,692Aug 21, 2023Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,575Jan 10, 2025Updated last year
- New generation of wmiexec.py☆1,289Apr 26, 2026Updated 3 weeks ago
- A collaborative, multi-platform, red teaming framework☆4,474Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Defeating Windows User Account Control☆7,576Feb 17, 2026Updated 3 months ago
- ☆33Aug 14, 2020Updated 5 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,848Updated this week
- Linux privilege escalation auditing tool☆6,487Mar 20, 2026Updated 2 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,328Aug 20, 2024Updated last year
- fireELF - Fileless Linux Malware Framework☆682Apr 17, 2019Updated 7 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,245Sep 10, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,687Jul 18, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,376Mar 10, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆422Aug 20, 2024Updated last year
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- Hash type identifier (CLI & lib)☆984Updated this week
- Windows Exploit Suggester - Next Generation☆4,845May 8, 2026Updated last week
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119May 18, 2016Updated 10 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,112Apr 13, 2026Updated last month