LD_PRELOAD Linux rootkit (x86 & ARM)
☆26Apr 8, 2019Updated 6 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- bdvl☆117Feb 26, 2022Updated 4 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆19Jan 31, 2025Updated last year
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆13Apr 15, 2024Updated last year
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated last week
- Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, clea…☆20Jan 15, 2026Updated last month
- ☆22Jul 8, 2022Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆23Sep 20, 2024Updated last year
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- LD_PRELOAD Rootkit☆303Apr 5, 2025Updated 10 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆265Dec 6, 2025Updated 2 months ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- ☆35Jan 27, 2025Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆33Jun 12, 2024Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- 基于SpringBoot的养老院管理系统,分为超级管理员、普通管理员、用户三个角色。 普通管理员可以在系统中对老人进行宿舍分配以及入住登记,对老人的病例和健康档案进行管理,对伙食、药品进行管理,对老人的外出和来访人员进行报备等操作。 超级管理员在普通管理员的基础上可以对普通…☆11Mar 8, 2025Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- ReVBShell - Reverse VBS Shell☆84Oct 22, 2025Updated 4 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- 🔥 Catalyst - THE Rust framework where webdev sucks less☆12Jun 10, 2025Updated 8 months ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 3 weeks ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Generating short scary stories through language model.☆14Apr 28, 2025Updated 9 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆53Feb 4, 2025Updated last year