Linux PAM Backdoor
☆373Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for linux-pam-backdoor
Users that are interested in linux-pam-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAM Backdoor☆32Mar 29, 2023Updated 3 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆272Jun 8, 2023Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,306Mar 10, 2026Updated last month
- eBPF hacks☆197Dec 12, 2024Updated last year
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆45Apr 13, 2018Updated 8 years ago
- Monitor linux processes without root permissions☆5,983Mar 1, 2026Updated last month
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- awesome-linux-rootkits☆2,062Feb 15, 2026Updated 2 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆238Sep 12, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,443Jul 20, 2024Updated last year
- Exploits for the TryHackMe room hackerNote☆31Feb 20, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- A small reverse shell for Linux & Windows☆640Jun 5, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆448Jan 5, 2025Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,893Dec 25, 2023Updated 2 years ago
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- Various *nix tools built as statically-linked binaries☆3,673Aug 21, 2023Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,556Jan 10, 2025Updated last year
- New generation of wmiexec.py☆1,282Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collaborative, multi-platform, red teaming framework☆4,432Updated this week
- Defeating Windows User Account Control☆7,523Feb 17, 2026Updated 2 months ago
- ☆33Aug 14, 2020Updated 5 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Linux privilege escalation auditing tool☆6,470Mar 20, 2026Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆3,306Aug 20, 2024Updated last year
- fireELF - Fileless Linux Malware Framework☆681Apr 17, 2019Updated 7 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,233Sep 10, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,675Jul 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The ultimate WinRM shell for hacking/pentesting☆5,358Mar 10, 2026Updated last month
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆422Aug 20, 2024Updated last year
- Windows Event Log Killer☆1,811Sep 21, 2023Updated 2 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- Hash type identifier (CLI & lib)☆965Apr 22, 2026Updated last week
- Windows Exploit Suggester - Next Generation☆4,828Apr 23, 2026Updated last week
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119May 18, 2016Updated 9 years ago