FastVPSEestiOu / AntidotoView external linksLinks
Linux antimalware and antirootkit tool
☆107Jan 16, 2022Updated 4 years ago
Alternatives and similar repositories for Antidoto
Users that are interested in Antidoto are comparing it to the libraries listed below
Sorting:
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- cut out a small (binary) piece of a (binary) file☆15Sep 20, 2011Updated 14 years ago
- Dns (Bind) Log Analyzer☆19Apr 16, 2019Updated 6 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- Play with CRIU in vagrant, all automated.☆10Oct 11, 2015Updated 10 years ago
- Route injector based on BIO routing daemon (https://github.com/bio-routing/bio-rd)☆12May 30, 2025Updated 8 months ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- ☆10Aug 5, 2015Updated 10 years ago
- maximize size of partition if possible (only partition table, without touching FS/LVM)☆31Feb 1, 2023Updated 3 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ACLHound☆19Feb 8, 2018Updated 8 years ago
- Instant negative hash cracking wordlist lookup☆13Jul 7, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- BGPmon☆17Feb 5, 2014Updated 12 years ago
- KVM Virtualization scripts☆16Oct 11, 2016Updated 9 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Analyze disk usage by file type☆15Oct 14, 2014Updated 11 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- Cross platform C event loop with coroutines and context support☆15May 28, 2019Updated 6 years ago
- ☆20Apr 11, 2024Updated last year
- PetardFS - a FUSE filessytem for injecting intentional errors (e.g. for testing)☆16Sep 18, 2018Updated 7 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Ansible role with modules to manage OpenVZ containers☆13May 25, 2015Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- LUKS support for storing keys in TPM NVRAM☆16May 9, 2017Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆13Dec 29, 2024Updated last year