MatheuZSecurity / SingularityLinks
Linux Kernel Rootkit for modern kernels (6x)
☆476Updated last week
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆183Updated 3 weeks ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆100Updated 2 weeks ago
- 🧞♂️ malware analysis☆37Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆132Updated 3 months ago
- ☆154Updated 6 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆345Updated 2 months ago
- Embed a payload inside a PNG file☆358Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆294Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆415Updated 5 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆372Updated last month
- Analyse your malware to surgically obfuscate it☆504Updated 5 months ago
- Proof of concept & details for CVE-2025-21298☆191Updated 9 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆223Updated 7 months ago
- ☆164Updated 8 months ago
- ☆157Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 7 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆62Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆652Updated last month
- ☆327Updated last month
- This is practice VM for malware development☆106Updated last week
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated 2 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆331Updated 4 months ago
- POC exploit for CVE-2024-49138☆263Updated 9 months ago
- A reverse shell for Windows and Linux written in C.☆78Updated 3 years ago
- early cascade injection PoC based on Outflanks blog post☆232Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆331Updated last year
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 2 months ago
- Evasion by machine code de-optimization.☆407Updated last year
- Tools for analyzing EDR agents☆268Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆111Updated 5 months ago