tmprecorder's repositories
CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
CVE-2022-0847-DirtyPipe-Exploits
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
CVE-2022-23222
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
CVE-2023-22809-sudoedit-privesc
A script to automate privilege escalation with CVE-2023-22809 vulnerability
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64)
DNS_ReverseShell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
log-credentials
PAM Log Credentials
RoguePotato
Another Windows Local Privilege Escalation from Service Account to System
gohtran
反向socks5代理, 关键词: go htran 重复造轮子 ssocks ew
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
SUDO_KILLER
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Telegram-RAT
Windows Remote Administration Tool via Telegram. Written in Python
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
userlandrootkit
Malicious Linux Library Used as Userland Rootkit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell