io_uring based rootkit
☆249Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for curing
Users that are interested in curing are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 10 months ago
- eBPF Memory Dump Tool☆100Aug 26, 2025Updated 6 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆434Dec 9, 2025Updated 2 months ago
- Red-Team LKM☆637Dec 16, 2025Updated 2 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 2 weeks ago
- ☆86Feb 4, 2026Updated 3 weeks ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system…☆350Oct 17, 2025Updated 4 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 3 months ago
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- ☆85May 15, 2025Updated 9 months ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- 🔍 Function-level tracing tool for Seccomp profiling, with eBPF☆177Feb 20, 2026Updated last week
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 6 months ago
- Execute ELF files without dropping them on disk☆503Jun 28, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Aug 31, 2025Updated 6 months ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆157Jun 5, 2025Updated 8 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- ☆22Jul 24, 2025Updated 7 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Jun 10, 2025Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆221Nov 3, 2025Updated 3 months ago
- Symbol hash for ELF files☆114Feb 9, 2022Updated 4 years ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated 2 weeks ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- ☆76Jul 12, 2025Updated 7 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆86May 13, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆516Feb 16, 2026Updated last week
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Jun 23, 2025Updated 8 months ago