stealth / crashLinks
crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
☆198Updated 3 months ago
Alternatives and similar repositories for crash
Users that are interested in crash are comparing it to the libraries listed below
Sorting:
- ICMP and DNS tunneling via IPv4 and IPv6☆214Updated 4 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 9 months ago
- A keystroke / terminal logger for Linux.☆216Updated last year
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Binary Protocol Differ☆118Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- RFC8484 and DoH/JSON resolver☆41Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated last year
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 5 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆281Updated 7 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- ☆65Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Resurrecting and updating the best log cleaner☆33Updated 10 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- ☆37Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Hide processes as a normal user in Linux.☆258Updated last year