A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by threat actors & those which have been incorporated into open-source user-mode rootkits.
☆88May 13, 2024Updated last year
Alternatives and similar repositories for ELFieScanner
Users that are interested in ELFieScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Load a dynamic library from memory using a fuse mount☆32Sep 15, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Aug 10, 2019Updated 6 years ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated 2 months ago
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- ☆186Apr 24, 2025Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆42Nov 15, 2025Updated 5 months ago
- ☆11May 17, 2024Updated last year
- Tools that can be useful for OSEP exam and PEN300 studies.☆88Mar 14, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- List the ETW provider(s) in the registration table of a process.☆82Sep 20, 2023Updated 2 years ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆222Jun 4, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan …☆284Sep 18, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated 11 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Apr 25, 2026Updated last week
- Select any exported function in a dll as the new dll's entry point.☆82Oct 25, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- ☆158Jul 31, 2022Updated 3 years ago
- Android Overlay Hijack☆30Sep 11, 2024Updated last year
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆166Apr 10, 2024Updated 2 years ago
- golang实现通过dcerpc和ntlmssp获取Windows远程主机信息☆29Apr 16, 2024Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- ☆12May 9, 2023Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆153Apr 26, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- miscellaneous codes☆38Sep 24, 2023Updated 2 years ago
- Protect against subdomain takeover☆95Updated this week
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Apr 22, 2024Updated 2 years ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆160Mar 26, 2025Updated last year
- ☆23Sep 20, 2024Updated last year