Whitelisting LD_PRELOAD libraries using LD_AUDIT
☆63Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for libpreloadvaccine
Users that are interested in libpreloadvaccine are comparing it to the libraries listed below
Sorting:
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆54Sep 4, 2018Updated 7 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 6 months ago
- ☆19Nov 26, 2020Updated 5 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆12Mar 24, 2018Updated 7 years ago
- ☆11Jul 15, 2024Updated last year
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago