YJesus / Unhide-NGLinks
Next generation !
☆69Updated 5 years ago
Alternatives and similar repositories for Unhide-NG
Users that are interested in Unhide-NG are comparing it to the libraries listed below
Sorting:
- Basic RDP honeypot script☆31Updated 2 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- a open source rat from china☆26Updated 9 years ago
- Exported from https://code.google.com/archive/p/hookme/☆44Updated 9 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 2 months ago
- ☆32Updated 9 years ago
- Python implementation of LZNT1 compression/decompression☆70Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Shellcode Spider of Exploit-DB☆11Updated 8 years ago
- 简单的Linux远程控制☆20Updated 8 years ago
- A Simple PE File Heuristics Scanners☆53Updated 6 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Updated 10 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Updated 7 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94Updated last year
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- ELF binary infector☆33Updated 14 years ago
- HTTP Protocol Stack CVE-2021-31166☆13Updated last year
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 8 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Updated 2 years ago
- ☆25Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 5 years ago