MatheuZSecurity / SingularityLinks
Stealthy Linux Kernel Rootkit for modern kernels (6x)
☆836Updated last week
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆423Updated last month
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- Red-Team LKM☆627Updated 3 weeks ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,272Updated 2 months ago
- Embed a payload inside a PNG file☆364Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆665Updated last month
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆356Updated 4 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆428Updated last week
- WMI virus, because funny☆298Updated 11 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆109Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆427Updated 7 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆173Updated 5 months ago
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆497Updated 2 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆746Updated 11 months ago
- Evasion by machine code de-optimization.☆412Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆297Updated last month
- Because AV evasion should be easy.☆847Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆834Updated 10 months ago
- Weaponize DLL hijacking easily. Backdoor any function in any DLL.☆693Updated 4 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆288Updated last week
- RunPE implementation with multiple evasive techniques (1)☆377Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆895Updated 3 weeks ago
- Windows Kernel Rootkit in Rust☆673Updated 3 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated 2 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆337Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆374Updated 4 months ago
- A tool to transform Chromium browsers into a C2 Implant☆529Updated 3 weeks ago