bdvl
☆117Feb 26, 2022Updated 4 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆132Aug 8, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Mar 7, 2024Updated last year
- A Simple Linux ELF Runtime Crypter☆271Feb 25, 2025Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Nov 20, 2025Updated 3 months ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 5 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆527Oct 12, 2022Updated 3 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆557Jul 3, 2020Updated 5 years ago
- Really stupid re-implementation of invoke-wmiexec☆217Feb 25, 2023Updated 3 years ago
- Universal Shared Library User-space Loader☆235May 19, 2022Updated 3 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 7 months ago
- Single executable reverse SOCKS5 proxy written in Golang.☆147Oct 27, 2025Updated 4 months ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆482Jul 12, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- ☆38Apr 15, 2025Updated 10 months ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆272Jun 8, 2023Updated 2 years ago
- ☆40May 21, 2022Updated 3 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆629Sep 8, 2022Updated 3 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆262Apr 24, 2021Updated 4 years ago