YJesus / Unhide-NGLinks
Next generation !
☆68Updated 4 years ago
Alternatives and similar repositories for Unhide-NG
Users that are interested in Unhide-NG are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Advanced threat detection solution for Linux.☆35Updated 4 years ago
- Basic RDP honeypot script☆32Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- a open source rat from china☆26Updated 9 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 8 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆91Updated last year
- ☆33Updated 9 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆40Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆105Updated 2 years ago
- 简单的Linux远程控制☆20Updated 8 years ago
- Web shell scanner and analyzer.☆112Updated 2 years ago
- Source code of DDG Mining Botnet tracker☆60Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- ☆62Updated 5 years ago
- bdvl☆114Updated 3 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Updated 6 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32Updated 5 years ago
- Windows (ShadowMove) Socket Duplication☆87Updated 5 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Updated 8 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- source code audit tool☆48Updated 4 years ago
- ☆18Updated 11 months ago