shipcod3 / IRC-Bot-Hunters
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆75Updated last year
Related projects: ⓘ
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 11 months ago
- Upgrade your netcat shell today!☆59Updated 7 years ago
- PHP root (suid) reverse shell☆72Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆53Updated 6 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆92Updated 3 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 11 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆81Updated last year
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆104Updated 4 years ago
- ☆36Updated this week
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆98Updated 6 years ago
- Ye olde root shell for ye olde httpd☆43Updated 9 years ago
- unix wildcard attacks☆130Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- A curated list of rootkits found on Github and other sites.☆61Updated 7 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆66Updated 4 years ago
- ☆86Updated 5 years ago
- ☆144Updated this week
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆68Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆75Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- POC of code that downloads and executes shellcode in memory.☆79Updated 10 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆120Updated 2 years ago
- OpenSource cross-platform python security toolkit (remote shell)☆46Updated last year
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆114Updated 6 years ago