Pinned Repositories
arsenal
Arsenal is just a quick inventory and launcher for hacking programs
CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
CVE-2022-0847-DirtyPipe-Exploits
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
CVE-2022-23222
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
CVE-2023-22809-sudoedit-privesc
A script to automate privilege escalation with CVE-2023-22809 vulnerability
CVE-2024-38077-POC
原文已被作者删除,备份用,非原创,EXP & POC
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64)
DNS_ReverseShell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
dnscat2
emp3r0r
Linux/Windows post-exploitation framework made by linux user
tmprecorder's Repositories
tmprecorder/arsenal
Arsenal is just a quick inventory and launcher for hacking programs
tmprecorder/CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
tmprecorder/CVE-2022-0847-DirtyPipe-Exploits
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
tmprecorder/CVE-2022-23222
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
tmprecorder/CVE-2023-22809-sudoedit-privesc
A script to automate privilege escalation with CVE-2023-22809 vulnerability
tmprecorder/CVE-2024-38077-POC
原文已被作者删除,备份用,非原创,EXP & POC
tmprecorder/Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64)
tmprecorder/DNS_ReverseShell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
tmprecorder/dnscat2
tmprecorder/emp3r0r
Linux/Windows post-exploitation framework made by linux user
tmprecorder/evil-winrm
The ultimate WinRM shell for hacking/pentesting
tmprecorder/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
tmprecorder/log-credentials
PAM Log Credentials
tmprecorder/README.md
README.md
tmprecorder/Reptile
LKM Linux rootkit
tmprecorder/RoguePotato
Another Windows Local Privilege Escalation from Service Account to System
tmprecorder/Rootkit
Let's try to create a rootkit!
tmprecorder/Stitch
Python Remote Administration Tool (RAT)
tmprecorder/frp20240608
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
tmprecorder/fscan
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。
tmprecorder/gohtran
反向socks5代理, 关键词: go htran 重复造轮子 ssocks ew
tmprecorder/KoviD
Linux kernel rootkit
tmprecorder/phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
tmprecorder/RustScan
🤖 The Modern Port Scanner 🤖
tmprecorder/SUDO_KILLER
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
tmprecorder/Telegram-RAT
Windows Remote Administration Tool via Telegram. Written in Python
tmprecorder/TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
tmprecorder/userlandrootkit
Malicious Linux Library Used as Userland Rootkit
tmprecorder/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
tmprecorder/yuze_ew
A socksv5 proxy tool Written by CLang. 一款纯C实现的基于socks5协议的轻量内网穿透工具,支持ew的全部数据转发方式,支持跨平台使用