stealth / crashLinks
crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
☆195Updated last month
Alternatives and similar repositories for crash
Users that are interested in crash are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆122Updated 6 months ago
- RFC8484 and DoH/JSON resolver☆40Updated last year
- ICMP and DNS tunneling via IPv4 and IPv6☆205Updated 2 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A keystroke / terminal logger for Linux.☆215Updated 10 months ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- opmsg p2p transport network☆71Updated 6 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆69Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- A Passive SSH back-end and scanner.☆102Updated 2 months ago
- Binary Protocol Differ☆119Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- File transfer via DNS☆73Updated 8 years ago
- Hide processes as a normal user in Linux.☆258Updated 10 months ago
- Passe Partout dumps cryptographic keys from running processes. It is useful to extract private ssh keys from ssh agent.☆27Updated 9 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 weeks ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 3 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- Private keys that have become public ...☆175Updated last month
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214Updated 3 years ago
- Web of trust grapher☆38Updated 2 weeks ago