blasty / JiaTansSSHAgentLinks
☆137Updated last year
Alternatives and similar repositories for JiaTansSSHAgent
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- eBPF hacks☆195Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- ☆76Updated 7 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- ☆55Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆199Updated 2 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Updated last year
- ☆131Updated 2 years ago
- eBPF Memory Dump Tool☆99Updated 5 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- BINARLY Research Tools and PoCs☆39Updated last year
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- ☆79Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated 3 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 9 months ago
- io_uring based rootkit☆249Updated 9 months ago
- In-Memory Rootkit For Linux and BSD☆87Updated 6 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆59Updated 11 months ago