xpn / ssh-inject
A ptrace POC by hooking SSH to reveal provided passwords
☆181Updated 8 years ago
Alternatives and similar repositories for ssh-inject:
Users that are interested in ssh-inject are comparing it to the libraries listed below
- bdvl☆113Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆73Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- FLARE Kernel Shellcode Loader☆177Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- A way to backdoor every process☆65Updated 7 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Proof-of-concept code for various bugs☆110Updated 6 months ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- Small tool to get a SYSTEM shell☆127Updated 9 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- ☆33Updated 9 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Updated 2 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆91Updated 10 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- ☆52Updated 3 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆235Updated 4 years ago
- Atredis Partners Security Advisories☆55Updated 2 months ago
- POC for Cobalt Strike external C2☆133Updated 3 years ago
- ☆148Updated 5 years ago