YJesus / UnhideLinks
Stable version of Unhide
☆188Updated 4 months ago
Alternatives and similar repositories for Unhide
Users that are interested in Unhide are comparing it to the libraries listed below
Sorting:
- Hide process,port,self under Linux using the ld_preload☆172Updated 4 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆93Updated last year
- Volatility Explorer Suit☆65Updated 3 years ago
- Project to decrypt and parse SSH traffic☆70Updated 5 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119Updated 9 years ago
- Next generation !☆69Updated 4 years ago
- This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit☆245Updated 3 years ago
- Hades is an cross-platform HIDS with kernel-space data collection.☆49Updated 2 years ago
- bdvl☆115Updated 3 years ago
- SysTracer: Linux 系统活动跟踪器☆33Updated 3 years ago
- Linux EDR written in Golang and based on eBPF.☆244Updated 3 years ago
- /root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.☆346Updated 2 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆162Updated 3 years ago
- Experimental and sneaky backdoor patch for OpenSSH Portable.☆24Updated 4 years ago
- XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.☆468Updated 3 weeks ago
- Sequoia exploit (7/20/21)☆78Updated 4 years ago
- Come inside, and have a nice cup of tea.☆109Updated 7 months ago
- Junk code - needless to explain☆77Updated 4 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Blog☆77Updated 2 years ago
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆28Updated last year
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆75Updated 2 years ago
- Resources About Shellcode☆215Updated 5 years ago
- Post-exploitation agent for Merlin☆202Updated 8 months ago
- A Simple Linux ELF Runtime Crypter☆264Updated 10 months ago
- ☆59Updated last year
- 攻击流量包,辅助安全运营/分析人员,HVV蓝队工程师开展流量攻击研判工作☆68Updated 2 years ago
- Domain Borrowing PoC☆216Updated 4 years ago
- ☆45Updated 4 years ago
- collect some exploit traffic pcap☆91Updated 10 months ago