detects several virtualizations
☆45Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for imvirt
Users that are interested in imvirt are comparing it to the libraries listed below
Sorting:
- ☆24Jun 29, 2021Updated 4 years ago
- ☆10Feb 14, 2017Updated 9 years ago
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- Icon file generator for Windows, macOS, Web☆15Oct 6, 2024Updated last year
- File-tests is test-suite for File tool. Previous home: https://fedorahosted.org/file-tests/☆21Dec 18, 2025Updated 2 months ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Debian CVE Scanner is self-contained CVE scanner for DEBIAN distributions written in golang.☆30Apr 21, 2023Updated 2 years ago
- Small .gbs chiptune player for Linux☆24Jul 14, 2022Updated 3 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Nov 25, 2017Updated 8 years ago
- POCs to test Vlang in cybersecurity aspects.☆37Dec 29, 2022Updated 3 years ago
- DJI Drone Control Hijacking☆41Sep 13, 2023Updated 2 years ago
- a port of the OpenBSD userland to Linux | unmaintained: use outils☆53Oct 1, 2013Updated 12 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- user mode apt-get☆14Aug 10, 2024Updated last year
- Kills TCP connections☆48Nov 18, 2022Updated 3 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Website for the Mininet Project.☆12Apr 1, 2022Updated 3 years ago
- Spec for the Flat Image Tree (FIT) specification☆14Jan 30, 2026Updated last month
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- ☆11Dec 30, 2025Updated 2 months ago
- FUSE based AES-CBC encrypted filesystem and encryption tool☆11Nov 12, 2017Updated 8 years ago
- Linux kernel programming using loadable kernel modules (LKMs)☆14Oct 25, 2018Updated 7 years ago
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- WebGui for generating Icinga configuration files☆10Jan 6, 2026Updated last month
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- [mirror] Virtuozzo Linux kernel☆45Apr 20, 2024Updated last year
- Command-line utility for filesystem disk quotas on Linux, Mac OS X, FreeBSD, OpenBSD, NetBSD, Solaris, AIX☆46Jul 24, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆11Jan 28, 2025Updated last year
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago