DeadManSwitch in rust with several triggers (remote local and network)
☆17Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for DeadManSwitch
Users that are interested in DeadManSwitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a software dead man's switch☆13Feb 1, 2026Updated last month
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- Odometry code based on 5225A the E-Bots Pilons In the Zone code adapted by Brian Boxell from WPI/9605A☆10Jul 28, 2019Updated 6 years ago
- Save chart image as a PNG☆17Apr 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- ☆65Dec 19, 2024Updated last year
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- (WIP) The set of all known built-in Android packages (with extra info). Used primarily by UAD-NG☆18Jan 6, 2025Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Install Oh my zsh with autosuggestion and syntax highligting☆35Feb 6, 2025Updated last year
- ☆14Jan 2, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Metadata Enchanced Collection Orientated Music Player☆19Mar 9, 2026Updated 2 weeks ago
- ☆18Sep 24, 2024Updated last year
- ☆12May 20, 2023Updated 2 years ago
- Header-only C++ library for producing PE files.☆36Jun 17, 2023Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- A community-driven collection of BloodHound queries☆175Feb 17, 2026Updated last month
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux kernel integrity monitor for detecting syscall hooking☆80Feb 16, 2026Updated last month
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- A simple script to disable Hyper-V and restart your pc , and to enable Hyper-V and restart your pc.☆20Jul 6, 2025Updated 8 months ago
- Eyecandy Screensaver ~ DvD logo in CLI written in C☆33Sep 9, 2025Updated 6 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year