unix-thrust / beurk
BEURK Experimental Unix RootKit
☆371Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for beurk
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆321Updated 7 years ago
- Automated Linux evil maid attack☆420Updated 8 years ago
- Repository holding all alternatives of *nix backdoors.☆154Updated 9 years ago
- A tool to help you write binary exploits☆606Updated 5 years ago
- Win32k LPE vulnerability used in APT attack☆286Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆723Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- UAC 0day, all day!☆276Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆328Updated 8 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆361Updated 9 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- A shellcode writing toolkit☆661Updated 2 years ago
- libpcap based ICMP encrypted backdoor for linux.☆129Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆458Updated 4 months ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated last year
- Utility for injecting executable code into a running process on x86/x64 Linux☆259Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆315Updated 2 years ago
- LibZeroEvil & the Research Rootkit project.☆589Updated 2 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- Linux v4.x.x Rootkit☆86Updated 3 months ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆642Updated 7 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆945Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- Hide processes as a normal user in Linux.☆255Updated 4 months ago
- ☆191Updated 7 years ago