☆51Sep 20, 2022Updated 3 years ago
Alternatives and similar repositories for DDexec
Users that are interested in DDexec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆889Mar 21, 2025Updated last year
- A statically typed version of pest.☆12Dec 2, 2025Updated 5 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆208Jan 3, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆30May 12, 2025Updated 11 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated 2 months ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- Insert the bitcoin blockchain data into elasticsearch☆15Feb 9, 2015Updated 11 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆453Mar 8, 2023Updated 3 years ago
- A daemonized DDexec.☆32Mar 22, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- MeteorJS DDP library for Golang☆16Updated this week
- Malware to gain persistence on a victims machine.☆21Feb 12, 2023Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Updated this week
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆26Aug 21, 2023Updated 2 years ago
- Command-line interface for Synology DiskStations. Allows batch-unlocking encrypted volumes.☆11Jul 30, 2020Updated 5 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- ☆26Aug 31, 2023Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- A simple Go module to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authenticat…☆19Feb 20, 2026Updated 2 months ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Sep 20, 2020Updated 5 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 10 months ago
- ☆144Oct 31, 2023Updated 2 years ago
- This repository contains examples of Kyverno policies for controlling the creation of Cilium Network policies☆22Nov 2, 2023Updated 2 years ago
- Automated setup of development environments and other miscellaneous scripts.☆12Mar 2, 2020Updated 6 years ago
- The evolution of Battlescribe2TTS☆17Mar 1, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- ☆42Jan 13, 2023Updated 3 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆19Jun 4, 2024Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 5 years ago