therealdreg / ptrace_misconfiguration_local_privilege_escalation
ptrace misconfiguration Local Privilege Escalation
☆11Updated last year
Alternatives and similar repositories for ptrace_misconfiguration_local_privilege_escalation:
Users that are interested in ptrace_misconfiguration_local_privilege_escalation are comparing it to the libraries listed below
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- Ransomware hello kitty☆22Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 3 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆91Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆43Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 3 years ago
- Let's try to create a rootkit!☆19Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆120Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆22Updated 3 years ago
- A simple "ransomware" using powershell☆13Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 2 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆33Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- HTTP botnet☆60Updated 8 years ago