stealth / crashLinks
crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
☆199Updated 4 months ago
Alternatives and similar repositories for crash
Users that are interested in crash are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 10 months ago
- ICMP and DNS tunneling via IPv4 and IPv6☆214Updated 5 months ago
- A keystroke / terminal logger for Linux.☆216Updated last year
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- RFC8484 and DoH/JSON resolver☆41Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆58Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆283Updated 7 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 3 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- ip6.arpa scanner☆32Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Resurrecting and updating the best log cleaner☆34Updated 10 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago