YJesus / Unhide-NGLinks
Next generation !
☆68Updated 4 years ago
Alternatives and similar repositories for Unhide-NG
Users that are interested in Unhide-NG are comparing it to the libraries listed below
Sorting:
- Basic RDP honeypot script☆32Updated 2 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Updated 6 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- Advanced threat detection solution for Linux.☆35Updated 4 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 8 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 5 years ago
- Source code of DDG Mining Botnet tracker☆60Updated 4 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆90Updated last year
- a open source rat from china☆26Updated 8 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆87Updated 6 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- bdvl☆114Updated 3 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 4 years ago
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆29Updated last year
- A decryptor for systems infected by Avaddon ransomware.☆24Updated 10 months ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆39Updated 10 years ago
- Sources code extracted from malwares for analysis☆39Updated 2 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆33Updated 9 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- ELF binary infector☆33Updated 14 years ago
- ☆32Updated 8 years ago
- Project to decrypt and parse SSH traffic☆66Updated 4 years ago