io_uring based rootkit
β251Apr 24, 2025Updated last year
Alternatives and similar repositories for curing
Users that are interested in curing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 7 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.β133Apr 13, 2025Updated last year
- eBPF Memory Dump Toolβ105May 7, 2026Updated last week
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β48Updated this week
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red-Team LKMβ641May 13, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.β44May 8, 2026Updated last week
- π Function-level tracing tool for Seccomp profiling, with eBPFβ176Feb 23, 2026Updated 2 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β30Nov 26, 2025Updated 5 months ago
- Kubescape eBPF agent π₯·π»β33May 12, 2026Updated last week
- A library for intercepting system callsβ103Jan 5, 2025Updated last year
- In-Memory Rootkit For Linux and BSDβ87Aug 9, 2025Updated 9 months ago
- Elf binary infector written in Go.β217Jan 11, 2025Updated last year
- β87Mar 30, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbersβ¦β19Feb 15, 2025Updated last year
- Simple root privilege escalation detection using eBPF πβ35Feb 10, 2026Updated 3 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 10 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ52Mar 10, 2025Updated last year
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target systemβ¦β357May 11, 2026Updated last week
- β86May 15, 2025Updated last year
- β165Mar 20, 2026Updated 2 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research toolβ45Apr 14, 2026Updated last month
- PoC Reverse Text segment ELF File infectorβ14Feb 28, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of ezine about viriiβ17Sep 13, 2022Updated 3 years ago
- Backdooring Claude Code via hooks in settings.json. Authorized use only!β80Apr 16, 2026Updated last month
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Calβ¦β261Jun 10, 2025Updated 11 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β224Nov 3, 2025Updated 6 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.β29Sep 11, 2021Updated 4 years ago
- The most complete code auditing platform with thousands of real-world challengesβ135Jun 21, 2025Updated 10 months ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolutionβ30Sep 10, 2020Updated 5 years ago
- β24Mar 4, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PoC multi-layer protector for ELF32 x86 binariesβ12Feb 26, 2022Updated 4 years ago
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 10 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rulesβ14Oct 20, 2022Updated 3 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL APIβ28Aug 7, 2024Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.β379Aug 29, 2025Updated 8 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programsβ339Feb 27, 2026Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β562May 6, 2026Updated last week