This is a simple process injection made in C for Linux systems
☆30Sep 23, 2023Updated 2 years ago
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- ☆32Sep 10, 2025Updated 8 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Make an Linux Kernel rootkit visible again.☆60Feb 27, 2025Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆64Jun 4, 2022Updated 3 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- A simple script to automate systemd backdoor☆71Dec 19, 2022Updated 3 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- CVE-2022-1040☆18Sep 25, 2022Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆116Sep 29, 2023Updated 2 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Feb 28, 2025Updated last year
- 「💽」MBR Overwrite malware for linux☆28Dec 7, 2024Updated last year
- Quickly find all identities someone has used on their Github commits☆17Jul 28, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆451Jan 5, 2025Updated last year
- 「🐞」Bug Bounty Tricks☆39Oct 4, 2023Updated 2 years ago
- 「💉」XSS Payload List☆46Feb 26, 2023Updated 3 years ago
- A simple Linux in-memory .so loader☆34Mar 29, 2023Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆40Dec 7, 2024Updated last year
- BSPWM (GruvBox Rice)☆20Jun 9, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- Open malware analysis / reversing database☆12Jun 14, 2021Updated 4 years ago
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- Collection of codes focused on Linux rootkits☆212Oct 22, 2025Updated 7 months ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆82Dec 16, 2024Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆287Apr 23, 2023Updated 3 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 「🛡️」AVs/EDRs Evasion tool☆104Dec 7, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 8 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 7 months ago
- A BOF to create a scheduled task using a COM object.☆18Dec 3, 2024Updated last year
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago