amlweems / sklton-keyLinks
decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook
☆15Updated 4 years ago
Alternatives and similar repositories for sklton-key
Users that are interested in sklton-key are comparing it to the libraries listed below
Sorting:
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Mara is a userland pty/tty sniffer☆53Updated 2 years ago
- ☆55Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Qemuno Framework☆24Updated 3 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- The God Name Server☆36Updated last week
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 7 months ago
- Java archive implant toolkit.☆61Updated 9 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 8 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆88Updated this week
- ☆94Updated last month
- Recon 2023 slides and code☆80Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆69Updated 2 years ago
- Elf binary infector written in Go.☆215Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- Programming course for Wannabes☆56Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- ☆70Updated 2 years ago
- A pcap capture analysis helper☆25Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆28Updated 6 months ago
- HTML Smuggling with Web Assembly☆66Updated last year