MatheuZSecurity / SingularityLinks
Stealthy Linux Kernel Rootkit for modern kernels (6x)
☆608Updated last week
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆187Updated 2 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆418Updated 2 weeks ago
- Embed a payload inside a PNG file☆360Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆355Updated this week
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆352Updated 3 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆165Updated 4 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆661Updated last week
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- POC exploit for CVE-2024-49138☆264Updated 10 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆423Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆462Updated 4 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆321Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆212Updated last month
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆107Updated last month
- ☆374Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆190Updated 11 months ago
- Generate backdoored RSA keys using SETUP☆219Updated 3 weeks ago
- RunPE implementation with multiple evasive techniques☆256Updated 3 months ago
- Evasive shellcode loader☆399Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆283Updated last week
- 🧞♂️ malware analysis☆36Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆41Updated 11 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 8 months ago
- ☆164Updated 9 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆334Updated last year
- ☆156Updated 8 months ago
- ☆329Updated 3 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆411Updated last month
- Evasion by machine code de-optimization.☆410Updated last year
- Analyse your malware to surgically obfuscate it☆511Updated last week