Linux antimalware and antirootkit tool
☆107Jan 16, 2022Updated 4 years ago
Alternatives and similar repositories for Antidoto
Users that are interested in Antidoto are comparing it to the libraries listed below
Sorting:
- Flood Shield is a very fast http flood blocker☆29Apr 21, 2015Updated 10 years ago
- BGP FU☆22Feb 24, 2023Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Dns (Bind) Log Analyzer☆19Apr 16, 2019Updated 6 years ago
- Route injector based on BIO routing daemon (https://github.com/bio-routing/bio-rd)☆12Mar 1, 2026Updated last week
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Play with CRIU in vagrant, all automated.☆10Oct 11, 2015Updated 10 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- ☆10Aug 5, 2015Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77May 21, 2024Updated last year
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- ACLHound☆19Feb 8, 2018Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Phantom OS temp workplace☆12Oct 10, 2019Updated 6 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Anti-rootkit works as a Windows system driver.☆13Mar 14, 2022Updated 3 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- BGPmon☆17Feb 5, 2014Updated 12 years ago
- Cross platform C event loop with coroutines and context support☆15May 28, 2019Updated 6 years ago
- ☆15Dec 29, 2018Updated 7 years ago
- Шаблоны инженерной документации для упрощения и сопровождения регламентных работ☆15Jul 30, 2021Updated 4 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- PetardFS - a FUSE filessytem for injecting intentional errors (e.g. for testing)☆16Sep 18, 2018Updated 7 years ago
- Ansible role with modules to manage OpenVZ containers☆13May 25, 2015Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Enable discrete SSH Agents to avoid leaking access across hosts☆20Dec 17, 2020Updated 5 years ago
- QuadBraces (MODX / Etomite) syntax parser☆15Aug 6, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- RESTful Visual Editor☆14Apr 14, 2016Updated 9 years ago