Cisco-Talos / flokibotLinks
☆29Updated 8 years ago
Alternatives and similar repositories for flokibot
Users that are interested in flokibot are comparing it to the libraries listed below
Sorting:
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- ☆24Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆20Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- ☆14Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆14Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- Infecting PE☆24Updated 11 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- ☆32Updated 11 months ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago