stealth / crash
crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
☆194Updated 6 months ago
Alternatives and similar repositories for crash:
Users that are interested in crash are comparing it to the libraries listed below
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆120Updated 4 months ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆113Updated last year
- ICMP and DNS tunneling via IPv4 and IPv6☆202Updated last year
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- RFC8484 and DoH/JSON resolver☆40Updated last year
- A keystroke / terminal logger for Linux.☆216Updated 8 months ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- disable LD_PRELOAD on linux☆21Updated 8 years ago
- Binary Protocol Differ☆117Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆225Updated 5 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆131Updated 7 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Passe Partout dumps cryptographic keys from running processes. It is useful to extract private ssh keys from ssh agent.☆26Updated 9 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- Runtime Process Infection Made Easy☆184Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆209Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- Linux v4.x.x Rootkit☆89Updated 8 months ago
- Inject shellcode into running processes in Linux.☆44Updated 8 months ago