LD_PRELOAD Linux rootkit (x86 & ARM)
☆26Apr 8, 2019Updated 7 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- bdvl☆117Feb 26, 2022Updated 4 years ago
- Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, clea…☆20Jan 15, 2026Updated 2 months ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- powershell免杀,Invoke-Obfuscation-Bypass分析和修改☆17Apr 13, 2023Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- A cracker library, much like SentryMBA but with more utilities and uses.☆11Apr 5, 2024Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆976Dec 11, 2020Updated 5 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Flash水坑修改版-添加操作系统判断,文件下载判断,exe base64编码进js内部无需302跳转伪造页面点击即可下载,js混淆☆14Nov 10, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- java版的NAT类型探测器☆17May 10, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆10Oct 29, 2019Updated 6 years ago
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆170Sep 30, 2025Updated 6 months ago
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- LD_PRELOAD Rootkit☆310Apr 5, 2025Updated last year
- XSS平台 CTF工具 Web安全工具☆11Jun 3, 2018Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆10Mar 14, 2018Updated 8 years ago
- LD_PRELOAD rootkit☆140Feb 29, 2024Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- Perform With Massive Wordpress Enumeration☆12Aug 18, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- Official JavaScript/TypeScript client for the Solana Tracker Data API.☆18Feb 28, 2026Updated last month
- 💬 Send iMessages using Python through the Shortcuts app.☆18May 25, 2024Updated last year