io_uring based rootkit
β250Apr 24, 2025Updated 11 months ago
Alternatives and similar repositories for curing
Users that are interested in curing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β44Mar 9, 2026Updated last month
- eBPF Memory Dump Toolβ103Apr 2, 2026Updated last week
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Red-Team LKMβ634Dec 16, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Updated this week
- π Function-level tracing tool for Seccomp profiling, with eBPFβ176Feb 23, 2026Updated last month
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scriptsβ441Dec 9, 2025Updated 4 months ago
- Kubescape eBPF agent π₯·π»β31Apr 2, 2026Updated last week
- A library for intercepting system callsβ103Jan 5, 2025Updated last year
- In-Memory Rootkit For Linux and BSDβ87Aug 9, 2025Updated 8 months ago
- Elf binary infector written in Go.β216Jan 11, 2025Updated last year
- β87Mar 30, 2026Updated last week
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colleβ¦β35Updated this week
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbersβ¦β19Feb 15, 2025Updated last year
- Simple root privilege escalation detection using eBPF πβ35Feb 10, 2026Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Mar 10, 2025Updated last year
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target systemβ¦β355Mar 17, 2026Updated 3 weeks ago
- β86May 15, 2025Updated 10 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research toolβ44Jan 18, 2026Updated 2 months ago
- PoC Reverse Text segment ELF File infectorβ14Feb 28, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of ezine about viriiβ17Sep 13, 2022Updated 3 years ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Calβ¦β259Jun 10, 2025Updated 9 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated 11 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β224Nov 3, 2025Updated 5 months ago
- Security framework for LLM-generated SQL queries π‘οΈβ32Nov 16, 2024Updated last year
- β76Jul 12, 2025Updated 8 months ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!β157Jun 5, 2025Updated 10 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.β29Sep 11, 2021Updated 4 years ago
- Cargo subcommand to build a crate into shellcodeβ27Aug 15, 2024Updated last year
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The most complete code auditing platform with thousands of real-world challengesβ137Jun 21, 2025Updated 9 months ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolutionβ30Sep 10, 2020Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binariesβ12Feb 26, 2022Updated 4 years ago
- Malware traffic obfuscation libraryβ38Jul 24, 2025Updated 8 months ago
- β52Dec 20, 2025Updated 3 months ago
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 9 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rulesβ14Oct 20, 2022Updated 3 years ago