LD_PRELOAD Linux rootkit (x86 & ARM)
☆26Apr 8, 2019Updated 6 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- bdvl☆117Feb 26, 2022Updated 4 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- gosocks is a golang based implementation of a socks5 server which supports custom handlers☆12Mar 10, 2026Updated last week
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- powershell免杀,Invoke-Obfuscation-Bypass分析和修改☆17Apr 13, 2023Updated 2 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 2 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Flash水坑修改版-添加操作系统判断,文件下载判断,exe base64编码进js内部无需302跳转伪造页面点击即可下载,js混淆☆14Nov 10, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- 加密PHP代码混淆☆10May 27, 2024Updated last year
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- ☆22Jul 8, 2022Updated 3 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆10Oct 29, 2019Updated 6 years ago
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- XSS平台 CTF工具 Web安全工具☆11Jun 3, 2018Updated 7 years ago
- LD_PRELOAD Rootkit☆309Apr 5, 2025Updated 11 months ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆10Mar 14, 2018Updated 8 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- 自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网☆13Dec 8, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Create a malicious pip package (PoC)☆12Sep 14, 2023Updated 2 years ago
- MERK is an open source, cross-platform, multiple-document interface GUI IRC client for Windows, Linux, and macOS written in Python, PyQt5…☆39Updated this week
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago