amlweems / sklton-keyLinks
decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook
☆14Updated 3 years ago
Alternatives and similar repositories for sklton-key
Users that are interested in sklton-key are comparing it to the libraries listed below
Sorting:
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated 8 months ago
- HTML Smuggling with Web Assembly☆64Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Mara is a userland pty/tty sniffer☆54Updated last year
- Userland exec PoC to be used as attack vector technique☆86Updated this week
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 3 years ago
- Asynchronous NFSv3 client in pure Python☆26Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated last week
- ☆84Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆67Updated last week
- The God Name Server☆33Updated 3 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated 2 months ago
- ☆55Updated 11 months ago
- Qemuno Framework☆24Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last month
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Recon 2023 slides and code☆79Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Java archive implant toolkit.☆61Updated 4 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- ☆69Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 5 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago