MatheuZSecurity / SingularityLinks
Linux Kernel Rootkit for modern kernels (6x)
☆308Updated this week
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆180Updated this week
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆126Updated 6 months ago
- ☆153Updated 6 months ago
- In-Memory Rootkit For Linux and BSD☆82Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆134Updated 2 months ago
- ☆70Updated 8 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated last month
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆254Updated this week
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆333Updated last month
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆72Updated 2 months ago
- ☆157Updated 4 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆124Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 7 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆249Updated 3 weeks ago
- ☆161Updated 7 months ago
- Proof of concept & details for CVE-2025-21298☆190Updated 9 months ago
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 4 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆331Updated 4 months ago
- Python tool to check rootkits in Windows kernel☆201Updated 2 months ago
- 🧞♂️ malware analysis☆37Updated last year
- Direct access to NTFS volumes☆280Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆99Updated 4 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆61Updated last year
- Tools for analyzing EDR agents☆264Updated last year
- Retrieve inner payloads from Donut samples☆110Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆369Updated last month
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆85Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆165Updated 11 months ago