Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject command with X11 lib.
# apt-get install libX11-dev libxtst-dev
# cd rootstealer/sendkeys;
Edit file rootstealer/cmd.cfg and write your command to inject.
You can take that following:
# make; cd .. #to back to path rootstealer/
# pip install gi
or
# pip install gir
Run the python script to spy all windows gui and search window with “root@” string in title.
$ python rootstealer.py &
$ sudo apt-get install libwnck-dev
$ gcc -o rootstealer rootstealer.c `pkg-config --cflags --libs libwnck-1.0` -DWNCK_I_KNOW_THIS_IS_UNSTABLE -DWNCK_COMPILATION
$ ./rootstealer &
Also Read XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool
We are not responsible for the evil use of that tool. Use that for a good purpose.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…