MatheuZSecurity / SingularityLinks
Stealthy Linux Kernel Rootkit for modern kernels (6x)
☆524Updated last week
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆188Updated last month
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆155Updated 3 months ago
- Embed a payload inside a PNG file☆360Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆658Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆419Updated 6 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 3 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆401Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆320Updated last week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆321Updated last year
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆104Updated 2 weeks ago
- ☆164Updated 9 months ago
- ☆374Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆329Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆504Updated 6 months ago
- RunPE implementation with multiple evasive techniques☆250Updated 2 months ago
- POC exploit for CVE-2024-49138☆265Updated 9 months ago
- ☆158Updated 5 months ago
- Evasion by machine code de-optimization.☆408Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆333Updated last year
- 🧞♂️ malware analysis☆37Updated last year
- ☆329Updated 2 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆223Updated 7 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆569Updated 2 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆495Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆255Updated 2 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆258Updated 2 months ago
- ☆154Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆272Updated last year
- ☆37Updated 10 months ago