io_uring based rootkit
β251Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for curing
Users that are interested in curing are comparing it to the libraries listed below
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.β133Apr 13, 2025Updated 11 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β44Mar 9, 2026Updated last week
- eBPF Memory Dump Toolβ100Feb 26, 2026Updated 3 weeks ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Red-Team LKMβ636Dec 16, 2025Updated 3 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Feb 8, 2026Updated last month
- π Function-level tracing tool for Seccomp profiling, with eBPFβ177Feb 23, 2026Updated 3 weeks ago
- Pack/Encrypt/Obfuscate ELF + SHELL scriptsβ439Dec 9, 2025Updated 3 months ago
- Kubescape eBPF agent π₯·π»β24Mar 12, 2026Updated last week
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colleβ¦β30Updated this week
- A library for intercepting system callsβ103Jan 5, 2025Updated last year
- In-Memory Rootkit For Linux and BSDβ87Aug 9, 2025Updated 7 months ago
- Elf binary infector written in Go.β215Jan 11, 2025Updated last year
- β86Feb 4, 2026Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Mar 10, 2025Updated last year
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbersβ¦β19Feb 15, 2025Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ60Jul 13, 2025Updated 8 months ago
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target systemβ¦β352Oct 17, 2025Updated 5 months ago
- β86May 15, 2025Updated 10 months ago
- β163Nov 19, 2025Updated 4 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research toolβ43Jan 18, 2026Updated 2 months ago
- PoC Reverse Text segment ELF File infectorβ14Feb 28, 2020Updated 6 years ago
- Collection of ezine about viriiβ17Sep 13, 2022Updated 3 years ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Calβ¦β256Jun 10, 2025Updated 9 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated 10 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β221Nov 3, 2025Updated 4 months ago
- β76Jul 12, 2025Updated 8 months ago
- Security framework for LLM-generated SQL queries π‘οΈβ32Nov 16, 2024Updated last year
- The most complete code auditing platform with thousands of real-world challengesβ136Jun 21, 2025Updated 8 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.β29Sep 11, 2021Updated 4 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolutionβ30Sep 10, 2020Updated 5 years ago
- β23Mar 4, 2025Updated last year
- PoC multi-layer protector for ELF32 x86 binariesβ12Feb 26, 2022Updated 4 years ago
- β52Dec 20, 2025Updated 3 months ago
- Malware traffic obfuscation libraryβ37Jul 24, 2025Updated 7 months ago
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 8 months ago
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights β¦β112Updated this week
- Exploit script for the CFOR vulnerability using Github's GraphQL APIβ23Aug 7, 2024Updated last year