/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
-
Updated
Feb 5, 2023 - C
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
Weaponizing the Linux Kernel (Hide Files/PID, SSH backdoors, SSL Sniffer, ...) by poking around eBPF/XDP
Proof of Concept (PoC) CVE-2021-4034
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion
Run Cobalt Strike BOFs in Brute Ratel C4!
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.
Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls.
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
RevEng.AI Radare2 Plugin
Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).
Sharp karambit web DNS subdomain crucifixion and assessor.
Improved Kernel Rootkits from nisay759's Rootkit collection to work with kernel versions 5.x + some other contributions. Coming more sooner or later! Contact me for any questions.
Script and hardware kit to automatically deauth 802.11 clients en masse. Captures packets for later nefariousness.
TL;DR: Mutate a binary to identify potential exploit candidates
Relay kit assessment for Infra and supply-chain mechanism, HTTP parsing with Linux GNU scanning for GUID and SUID based on (https://attack.mitre.org/matrices/enterprise/linux/).
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."