speknet / ping-backLinks
Linux backdoor using ICMP payload for activation
☆11Updated 10 years ago
Alternatives and similar repositories for ping-back
Users that are interested in ping-back are comparing it to the libraries listed below
Sorting:
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 11 months ago
- Code injection via delay load libraries☆35Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- ☆22Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- ☆22Updated 8 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 12 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆11Updated 5 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- random python stuff☆26Updated 9 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 10 years ago
- ☆12Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Anti-AV compilation☆44Updated 12 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago