☆17Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Technology, papers, products and other documents related to large language models and large language model security☆17Mar 29, 2024Updated 2 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Mar 2, 2023Updated 3 years ago
- go语言免杀shellcode☆19Dec 31, 2021Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆39Mar 30, 2026Updated last month
- Entra ID Password Protection Banned Password Lists☆19Apr 16, 2024Updated 2 years ago
- RDP Credential Provider☆12Oct 29, 2025Updated 6 months ago
- ☆43Sep 18, 2020Updated 5 years ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆12Jun 25, 2023Updated 2 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆44Jan 18, 2025Updated last year
- CoREBench: Errors in Find, Grep, Make☆13Dec 10, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12May 4, 2026Updated 2 weeks ago
- ☆19Aug 25, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- ☆26Aug 25, 2020Updated 5 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 杂 物 收 纳☆15Aug 4, 2023Updated 2 years ago
- Indicators of compromise☆18May 13, 2026Updated last week
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated 2 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago