MatheuZSecurity / Imperius
Make an Linux Kernel rootkit visible again.
☆47Updated 3 weeks ago
Alternatives and similar repositories for Imperius:
Users that are interested in Imperius are comparing it to the libraries listed below
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆71Updated 3 weeks ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆32Updated 3 months ago
- ☆28Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 2 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- ☆53Updated 4 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆46Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆64Updated last year
- A Moodle Scanner☆39Updated 4 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- A small red team course☆35Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 9 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆34Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆34Updated 6 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- ☆54Updated 4 months ago
- ☆28Updated last week