YJesus / UnhideLinks
Stable version of Unhide
☆178Updated 2 months ago
Alternatives and similar repositories for Unhide
Users that are interested in Unhide are comparing it to the libraries listed below
Sorting:
- Hide process,port,self under Linux using the ld_preload☆172Updated 3 years ago
- Hades is an cross-platform HIDS with kernel-space data collection.☆47Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆90Updated last year
- SysTracer: Linux 系统活动跟踪器☆32Updated 2 years ago
- Volatility Explorer Suit☆65Updated 2 years ago
- Linux EDR written in Golang and based on eBPF.☆244Updated 3 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆74Updated 2 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆163Updated 3 years ago
- This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit☆239Updated 2 years ago
- Project to decrypt and parse SSH traffic☆66Updated 4 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119Updated 9 years ago
- Come inside, and have a nice cup of tea.☆106Updated 5 months ago
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆26Updated 10 months ago
- ☆57Updated last year
- dump Transfer Layer Security data without certificate☆71Updated last year
- ☆45Updated 3 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Next generation !☆68Updated 4 years ago
- collect some exploit traffic pcap☆86Updated 7 months ago
- Junk code - needless to explain☆77Updated 4 years ago
- 攻击流量包,辅助安全运营/分析人员,HVV蓝队工程师开展流量攻击研判工作☆67Updated 2 years ago
- 17条检测cobaltstrike的suricata-ids规则☆67Updated 3 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- The port forwarding tool developed by Golang solves the problem that the internal and external networks cannot communicate in certain sce…☆148Updated 4 years ago
- CVE-2021-4034 POC exploit☆35Updated 3 years ago
- ☆30Updated 2 years ago
- Blog☆73Updated 2 years ago
- /root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.☆339Updated 2 years ago
- 毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;☆150Updated 2 years ago
- Godzilla source code☆84Updated 5 years ago