Welcome
I am Antonius (w1sdom), an independent it security researcher based in Indonesia.
Github : bluedragonsecurity
PacketStorm : packetstorm
Twitter : bluedragonsec
Medium : @w1sdom
Youtube : robotsoft
Youtube : antoniusringlayer
Github : antoniusrobotsoft
Another fields that I do : robotic, math, artificial intelligence.
my write-up about it security in english : /docs-en/ - write-up in indonesia : /docs/
my write-up about robotics, electronic & iot (& some prototypes): /var/robotic/
my write-up about math : /var/math/
my write-up about AI : /var/ai/
Dirty Pipe 2 - Linux Kernel 5.8 < 5.15.25 - Local Privilege Escalation
This is an exploit variant for linux kernel vulnerability found by Max Kellerman
bds_lkm_ftrace.tar.bz2
Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x - linux kernel 6.2 on x86_64, hides files, hides process, hides bind shell & reverse shell port, privilege escalation, cleans up logs and bash history during installation
bds_freebsd.tar.bz2
Freebsd KLD Rootkit for FreeBSD 13. Hides files, hides process, hides port, bind shell backdoor
bds_userland.tar.bz2
Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, cleans up bash history and logs during installation
bds_lkm.tar.bz2
Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hides bind shell & reverse shell port, privilege escalation, cleans up logs and bash history
evil-cowrie.tar.bz2
Modification of Cowrie for SSH MITM (Man in the Middle) Attack
openssh8_trojanned.tar.bz2
trojanned openssh-8.0p1 client, ssh client will log username and password into /opt/.../log.txt