Category: Maintaining Access

LKM Linux rootkit

Reptile: LKM Linux rootkit

Reptile LKM Linux rootkit Tested on Debian 9: 4.9.0-8-amd64 Ubuntu 18.04.1 LTS: 4.15.0-38-generic Kali Linux: 4.18.0-kali2-amd64 Centos 7: 3.10.0-862.3.2.el7.x86_64 Centos 6.10: 2.6.32-754.6.3.el6.x86_64 Features Give root to unprivileged users Hide files and directories Hide processes...

WMImplant

WMImplant: RAT powershell Tool

WMImplant A PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as the C2 channel for issuing commands and receiving results. It will likely require local administrator permissions on...

mole

mole: cli app to create ssh tunnels

Mole is a cli application to create ssh tunnels, forwarding a local port to a remote address through an ssh server. Features Auto local address selection: find a port available and start listening to it, so the -local flag doesn’t need to be...

PenTesters Framework

PenTesters Framework(PTF) v2.1.3 released

As a penetration tester, I know that you usually choose to use Kali Linux like penetration testing distribution. Kali Linux is a powerful distribution. It includes many, many pentesting tools. If you are Ubuntu/...

icmpsh

icmpsh: Simple reverse ICMP shell

Sometimes, network administrators make the penetration tester’s life harder. Some of them do use firewalls for what they are meant to, surprisingly! Allowing traffic only onto known machines, ports and services (ingress filtering) and...