MatheuZSecurity / Imperius
Make an Linux Kernel rootkit visible again.
☆47Updated 2 weeks ago
Alternatives and similar repositories for Imperius:
Users that are interested in Imperius are comparing it to the libraries listed below
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Docker container for running CobaltStrike 4.10☆36Updated 5 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆46Updated 2 months ago
- ☆53Updated 4 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆71Updated 2 weeks ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 6 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 9 months ago
- Cobalt Strike BOFS☆15Updated last year
- A Moodle Scanner☆39Updated 3 months ago
- ☆34Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 6 months ago
- A small red team course☆35Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆32Updated 3 months ago
- ☆28Updated last year
- ☆54Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆46Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- vulnlab.com reaper writeup☆26Updated last year
- ☆11Updated 2 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 3 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year