Linux PAM Backdoor
☆371Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for linux-pam-backdoor
Users that are interested in linux-pam-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAM Backdoor☆32Mar 29, 2023Updated 3 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆271Jun 8, 2023Updated 2 years ago
- eBPF hacks☆198Dec 12, 2024Updated last year
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,283Mar 10, 2026Updated 3 weeks ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Monitor linux processes without root permissions☆5,952Mar 1, 2026Updated last month
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- awesome-linux-rootkits☆2,042Feb 15, 2026Updated last month
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,437Jul 20, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A small reverse shell for Linux & Windows☆636Jun 5, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆445Jan 5, 2025Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,881Dec 25, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- Various *nix tools built as statically-linked binaries☆3,658Aug 21, 2023Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,538Jan 10, 2025Updated last year
- New generation of wmiexec.py☆1,277Mar 24, 2026Updated 2 weeks ago
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Defeating Windows User Account Control☆7,469Feb 17, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- ☆33Aug 14, 2020Updated 5 years ago
- Linux privilege escalation auditing tool☆6,451Mar 20, 2026Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,291Aug 20, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,215Sep 10, 2020Updated 5 years ago
- fireELF - Fileless Linux Malware Framework☆680Apr 17, 2019Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,325Mar 10, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆422Aug 20, 2024Updated last year
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- Hash type identifier (CLI & lib)☆963Apr 2, 2026Updated last week
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- Windows Exploit Suggester - Next Generation☆4,805Apr 2, 2026Updated last week
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119May 18, 2016Updated 9 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Mar 25, 2026Updated 2 weeks ago