speknet / ping-backLinks
Linux backdoor using ICMP payload for activation
☆11Updated 10 years ago
Alternatives and similar repositories for ping-back
Users that are interested in ping-back are comparing it to the libraries listed below
Sorting:
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Shellcode Of Death☆41Updated 12 years ago
- ☆22Updated 8 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- ☆17Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Windows Privilege Escalation☆10Updated 10 years ago
- ☆12Updated 7 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 12 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- Shellcode tracer☆15Updated 9 years ago
- Simple VM-based scripting language☆13Updated 5 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆15Updated 9 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 10 months ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Bootkit for Windows 7☆29Updated 11 years ago
- CVE-2014-0816☆25Updated 8 years ago