Category: Exploitation

gshark-framework

boopkit v1.4.1 releases: Linux eBPF backdoor over TCP

Boopkit Linux backdoor, rootkit, and eBPF bypass tools. Remote command execution over raw TCP. Tested on Linux kernel 5.16 Tested on Linux kernel 5.17 Remote code execution over TCP (SSH, Nginx, Kubernetes, etc) Network...

creating shellcodes

masm_shc v0.2.1 releases: creating shellcodes

masm_shc A helper utility for creating shellcodes. Cleans MASM file generated by MSVC gives refactoring hints. demos Examples of the code to be refactored to shellcode: popup.cpp – a simple “Hello World” Message Box...

shellcode injection techniques

DInjector: Collection of shellcode injection techniques

DInjector This repository is an accumulation of my code snippets for various shellcode injection techniques using fantastic D/Invoke API by @TheWover and @FuzzySecurity. Features: Fully ported to D/Invoke API. Encrypted payloads which can be invoked from a URL...

FudgeC2

FudgeC2: A collaborative C2 framework for purple-teaming

FudgeC2 FudgeC2 is a campaign-orientated Powershell C2 framework built on Python3/Flask – Designed for team collaboration, client interaction, campaign timelining, and usage visibility. Users Users within Fudge are divided into 2 groups, admins and...