unix-thrust / beurk
BEURK Experimental Unix RootKit
☆380Updated 7 years ago
Alternatives and similar repositories for beurk:
Users that are interested in beurk are comparing it to the libraries listed below
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- A tool to help you write binary exploits☆607Updated 6 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated 2 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆327Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆148Updated last year
- linux rootkit☆157Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 7 months ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆652Updated 11 months ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Hide processes as a normal user in Linux.☆253Updated 7 months ago
- A shellcode writing toolkit☆661Updated 2 years ago
- Win32k LPE vulnerability used in APT attack☆287Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆647Updated 7 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago