therealdreg / ptrace_misconfiguration_local_privilege_escalationLinks
ptrace misconfiguration Local Privilege Escalation
☆11Updated 2 years ago
Alternatives and similar repositories for ptrace_misconfiguration_local_privilege_escalation
Users that are interested in ptrace_misconfiguration_local_privilege_escalation are comparing it to the libraries listed below
Sorting:
- A next generation of ransomware. Fully written using a .Net Framework + C&C System☆41Updated 9 years ago
- Ransomeware☆46Updated 8 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆96Updated 2 years ago
- HTTP botnet☆62Updated 9 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆47Updated 9 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- They Can't Stop us☆10Updated 8 years ago
- Tool to perform Brute Force Attack FTP☆11Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Updated 4 months ago
- ☆22Updated 9 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- ☆53Updated 4 years ago
- Malicious Software SRC Extract☆32Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- x64 Windows Exploit Development☆114Updated last year
- Let's try to create a rootkit!☆20Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- TaskMgr Volatile Environment LPE☆16Updated 4 months ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆24Updated 8 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago