Category: Maintaining Access

LKM Linux rootkit

Reptile: LKM Linux rootkit

Reptile LKM Linux rootkit Tested on Debian 9: 4.9.0-8-amd64 Ubuntu 18.04.1 LTS: 4.15.0-38-generic Kali Linux: 4.18.0-kali2-amd64 Centos 7: 3.10.0-862.3.2.el7.x86_64 Centos 6.10: 2.6.32-754.6.3.el6.x86_64 Features Give root to unprivileged users Hide files and directories Hide processes...


WMImplant: RAT powershell Tool

WMImplant A PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as the C2 channel for issuing commands and receiving results. It will likely require local administrator permissions on...


icmpsh: Simple reverse ICMP shell

Sometimes, network administrators make the penetration tester’s life harder. Some of them do use firewalls for what they are meant to, surprisingly! Allowing traffic only onto known machines, ports and services (ingress filtering) and...