/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
-
Updated
Feb 5, 2023 - C
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion
Proof of Concept (PoC) CVE-2021-4034
Weaponizing the Linux Kernel (Hide Files/PID, SSH backdoors, SSL Sniffer, ...) by poking around eBPF/XDP
Run Cobalt Strike BOFs in Brute Ratel C4!
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.
MFA and 2FA chainers, authentication PenTesting frameworks.
Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls.
RevEng.AI Radare2 Plugin
Sharp karambit web DNS subdomain crucifixion and assessor.
Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).
TL;DR: Mutate a binary to identify potential exploit candidates
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
Script and hardware kit to automatically deauth 802.11 clients en masse. Captures packets for later nefariousness.
Improved Kernel Rootkits from nisay759's Rootkit collection to work with kernel versions 5.x + some other contributions. Coming more sooner or later! Contact me for any questions.
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."