silentbridge
Diamorphine
silentbridge | Diamorphine | |
---|---|---|
3 | 1 | |
217 | 1,669 | |
- | - | |
0.0 | 3.0 | |
11 months ago | 8 months ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
silentbridge
-
How to Build the Perfect Red Team Hardware Implant
I don’t handle the drop boxes at my work but I do know for nac bypass we use SilentBridge https://github.com/s0lst1c3/silentbridge currently, although we are evaluating different solutions.
-
Has anyone here attempted to build the mechanical switch Silentbridge rogue device?
I'm trying to build a RPI rogue device for bypassing 802.1x during Red Teaming engagement, that is based on Silentbridge. We have had some success with the basic version, but we have been caught and blocked several times due to a newer 802.1x in place, which should also be bypassable with an addition of passive network tap and AB switching.
-
Need help with setting up an OpenWRT router for wired 802.1x?
As a part of pentest engagement I'm working on I've been tasked with setting up an implant/dropbox that will be plugged into the customer's network and left behind as a 4G backdoor. The network is using 802.1x for port authentication, and I need to create a lab to test whether the device (a RPi running silentbridge) is working correctly and can bypass the port security.
Diamorphine
-
GitHub - jafarlihi/modreveal: Utility to find hidden Linux kernel modules
Looks like it can be used to detect the linked rootkit https://github.com/m0nad/Diamorphine
What are some alternatives?
tap - The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization.
Dimorf - Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
RecycledInjector - Native Syscalls Shellcode Injector
HiddenWall - Linux kernel module generator for Hidden firewall that follows the rules in the external YAML file.
htkit - Information Gathering Simplified.
casper-fs - Casper-fs is a Custom Hidden Linux Kernel Module generator. Each module works in the file system to protect and hide secret files.
skiboot - OPAL boot and runtime firmware for POWER
SmmBackdoorNg - Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
modreveal - Utility to find hidden Linux kernel modules
reveng_rtkit - Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
pixiewps - An offline Wi-Fi Protected Setup brute-force utility
dtrace-utils - DTrace-utils contains the DTrace port to Linux