Tools designed for maintaining access to systems and proof-of-concept demonstrations written by the team at Hacker House. These tools are designed to simulate or demonstrate common persistence techniques such as kernel mode hooking and command & control implementations.
File | Description |
---|---|
bindshell.go | bind shell example written in GoLang |
bindshell.py | bind shell example writen in Python |
cmdbot.py | Python bot to exec commands via IRC C2 |
filehider.tgz | Linux kernel module for hiding files |
halloween.py | Python script appender VX injection PoC |
icmp.py | ICMP raw socket command execution |
luna.tgz | AX.25 APRS C2 implementation PoC (works via satellite) |
magicroot.tgz | Linux kernel module for "magic" root backdoor |
MalwareTool.tgz | PE executable dropper via embedded resource |
Peony.zip | Windows Defender Avbypass meterpreter harness |
rubilyn-0.0.1.tar.gz | OS-X Lion 64bit rootkit example code |
SYSTEMservice.tgz | Windows service persistent bind shell (SYSTEM) |
StringCrypt.tgz | OS-X string encryptor for use with rubilyn |
TrojanSource.zip | Web based C2 implant to capture screen & keystrokes |
yolo-openssl.tgz | OpenSSL backdoor to add "yolo shellme" extension |
Zombie.tgz | Multi-threaded Linux backdoor with command execution |
These files are available under a Attribution-NonCommercial-NoDerivatives 4.0 International license.