Skip to content
/ PANIX Public
forked from Aegrah/PANIX

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

License

Notifications You must be signed in to change notification settings

lily110/PANIX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 

Repository files navigation

Aegrah's Linux Persistence Honed Assistant

Twitter LinkedIn Blog GitHub

Short introduction (purple team fashion, used to detect engineering, but can also be used for penetration testing purposes). Not built as a stealthy tool.

Systems it runs on (Debian/Fedora etc.)

List of publications in which this tool is used in a purple teaming fashion:

Title 1; Title 2

Share

Share ALPHA ...

GitHub Repo stars GitHub Repo stars GitHub Repo stars GitHub Repo stars GitHub Repo stars

Disclaimer

Disclaimer here..

References

References here..

To Do's for now.

### Persistence methods
- [ ] sudo hijacking
- [ ] Shared object hooking
- [ ] web shell --> ask user input? Or php/asp(x) etc.?

- [ ] Dynamic Linker Hijacking, add to ld.so.preload (LD_PRELOAD)
- [ ] LKM
- [ ] ICMP backdoor https://github.com/droberson/icmp-backdoor
- [ ] git backdooring https://hadess.io/the-art-of-linux-persistence/
- [ ] PAM module https://attack.mitre.org/techniques/T1556/003/, https://rosesecurityresearch.com/crafting-malicious-pluggable-authentication-modules-for-persistence-privilege-escalation-and-lateral-movement

- [ ] Maybe's:
  - [ ] symlinks somehow
  - [ ] chroot environments
  - [ ] rogue container
  - [ ] port knocking
  - [ ] malicious dpkg package?
  - [ ] Trap signal https://attack.mitre.org/techniques/T1546/005/
  - [ ] init/kernel level; ls24
- [ ] Make it executable in memory

About

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%