☆18Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- Technology, papers, products and other documents related to large language models and large language model security☆17Mar 29, 2024Updated 2 years ago
- go语言免杀shellcode☆19Dec 31, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 5 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- linux 核心模組, 使用 netfilter IPv4 hook 監聽和分析 DNS 請求和回應封包.☆14Oct 25, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆37Mar 30, 2026Updated 3 weeks ago
- BUGX.IO Vulnerability Review Standard☆13Mar 25, 2020Updated 6 years ago
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- RDP Credential Provider☆12Oct 29, 2025Updated 6 months ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- user-space elf loader☆16Nov 18, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆19Dec 12, 2023Updated 2 years ago
- CoREBench: Errors in Find, Grep, Make☆13Dec 10, 2015Updated 10 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Static code injection using text padding and reverse text extension☆11Jun 7, 2017Updated 8 years ago
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12Apr 10, 2026Updated 2 weeks ago
- ☆19Aug 25, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python Module for parsing Apple ASL Logs☆15Apr 7, 2016Updated 10 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated 2 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆43Dec 7, 2025Updated 4 months ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago