A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x
☆103Dec 16, 2025Updated 3 months ago
Alternatives and similar repositories for Venom
Users that are interested in Venom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Author of Project Adrishya a rootkit which use ftrace mechanism to hook syscall; (write this because God commanded me); work for both x86…☆28Sep 19, 2025Updated 6 months ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- A set of tools and resources for analysis of Havoc C2☆27Feb 27, 2024Updated 2 years ago
- ☆27May 6, 2025Updated 10 months ago
- TryHackMe Roadmap☆53Apr 23, 2024Updated last year
- Generate Proxy DLLs in Rust☆50Mar 2, 2026Updated 3 weeks ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- Malware to gain persistence on a victims machine.☆20Feb 12, 2023Updated 3 years ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆11Dec 25, 2022Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Nov 20, 2023Updated 2 years ago
- A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found somethin…☆34Jan 26, 2025Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- ☆13Mar 6, 2025Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 4 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- PhoneFy un simple script para obtener informacion de un telefono☆11Nov 5, 2021Updated 4 years ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated last month
- ☆10Dec 8, 2022Updated 3 years ago
- Chisel new generation, written in rust. SSH under WSS with some customization.☆129Jan 24, 2026Updated 2 months ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- improved external backtrack☆11Apr 16, 2019Updated 6 years ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆90Jul 15, 2025Updated 8 months ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- Making your own CTF☆26Jan 5, 2021Updated 5 years ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 8 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 3 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Jun 10, 2025Updated 9 months ago
- ☆13Apr 14, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- purplestorm writeup collection☆30Mar 16, 2026Updated last week
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆14Nov 20, 2025Updated 4 months ago
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Sep 29, 2025Updated 5 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago