YJesus / Unhide-NGLinks
Next generation !
☆68Updated 4 years ago
Alternatives and similar repositories for Unhide-NG
Users that are interested in Unhide-NG are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- Basic RDP honeypot script☆32Updated 2 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 8 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- a open source rat from china☆12Updated 8 years ago
- a open source rat from china☆26Updated 8 years ago
- Sources code extracted from malwares for analysis☆39Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- Windows (ShadowMove) Socket Duplication☆86Updated 5 years ago
- ☆71Updated 8 years ago
- Python implementation of LZNT1 compression/decompression☆65Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 8 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- QuasarRAT analysis tools and research report☆27Updated last year
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32Updated 5 years ago
- ELF binary infector☆33Updated 14 years ago
- ☆24Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Windows Console Monitoring☆100Updated 8 years ago
- ☆21Updated 5 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 4 years ago