c-skills / vala-vala-hey
Manjaro LPE
☆34Updated last year
Alternatives and similar repositories for vala-vala-hey:
Users that are interested in vala-vala-hey are comparing it to the libraries listed below
- WallEscape vulnerability in util-linux☆51Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 4 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 10 months ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆25Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 4 months ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 10 months ago
- Rebuild of portspoof in GO with additional features.☆17Updated last week
- ☆12Updated 2 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- A simple Meterpreter stager written in Rust.☆37Updated 7 months ago
- ☆46Updated 2 years ago
- iTLB multihit PoC☆40Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ☆81Updated last year
- POC of CVE-2023-35086 only DoS☆45Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆112Updated last month
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- yet another hidden LKM hunter☆22Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 3 months ago
- Golang bindings for PE-sieve☆43Updated last year
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- stealth userland kit that doesn't use sys_clone/sys_execve call☆30Updated last month
- An evil bit backdoor for iptables☆52Updated 4 years ago
- Linux Sleep Obfuscation☆97Updated last year
- easy dll proxying in go☆13Updated 3 years ago
- Universal root exploit for the linux kernel☆24Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Signing-key abuse and update exploitation framework☆125Updated last month