IAIK / SnailLoad
☆33Updated 6 months ago
Alternatives and similar repositories for SnailLoad:
Users that are interested in SnailLoad are comparing it to the libraries listed below
- Checks for tpm vulnerabilities☆36Updated last year
- A collection of bypasses and exploits for eBPF-based cloud security.☆19Updated last year
- ☆62Updated last year
- Publications from the eBPF foundation☆22Updated 2 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆48Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆59Updated last month
- Fuzz Network Traffic☆15Updated 3 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- In-Memory Rootkit For Linux☆72Updated 2 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆12Updated this week
- masscan with exclusive excludes☆55Updated last year
- ☆17Updated 10 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 7 months ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated 7 months ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 8 months ago
- ☆85Updated 6 months ago
- Kiddy - (linux) kernel identity spoofer☆13Updated 10 months ago
- Parser for Windows PowerShell script block logs☆13Updated 2 weeks ago
- GitHub CVE Repository Hunt☆18Updated 5 months ago
- ☆24Updated 2 years ago
- A distributed network mapper/security scanner.☆16Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated 9 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆59Updated 3 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Legba recipes.☆43Updated 4 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆83Updated 2 months ago