xpn / ssh-inject
A ptrace POC by hooking SSH to reveal provided passwords
☆181Updated 7 years ago
Alternatives and similar repositories for ssh-inject:
Users that are interested in ssh-inject are comparing it to the libraries listed below
- bdvl☆112Updated 2 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆145Updated 4 years ago
- Proxy system calls over an RPC channel☆97Updated 3 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- Poc for CVE-2019-1253☆154Updated 3 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆224Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- A way to backdoor every process☆65Updated 7 years ago
- Small tool to get a SYSTEM shell☆130Updated 9 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Shellcoding utilities☆221Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆138Updated 2 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆173Updated 4 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- ☆262Updated last year
- ☆131Updated last year
- ☆147Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 4 years ago
- POC for cve-2019-1458☆172Updated 3 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- Atredis Partners Security Advisories☆55Updated 7 months ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- Steal privileged token to obtain SYSTEM shell☆247Updated 4 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆233Updated 4 years ago
- POC for Cobalt Strike external C2☆124Updated 3 years ago
- Linux v4.x.x Rootkit☆88Updated 6 months ago