ProfessionallyEvil / LD_PRELOAD-run-at-load-time
Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.
☆11Updated 2 years ago
Alternatives and similar repositories for LD_PRELOAD-run-at-load-time:
Users that are interested in LD_PRELOAD-run-at-load-time are comparing it to the libraries listed below
- egrets monitors egress☆45Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 3 months ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆12Updated last year
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- go reversing helpers for binaryninja☆28Updated 2 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- Tool to recursively download versioned source code from .svn directories (pre Subversion-1.7 "WC-NG" format)☆8Updated 10 years ago
- ☆25Updated 10 months ago
- lightweight CVE search☆21Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ☆16Updated 4 years ago