chokepoint / CryptHook
TCP/UDP symmetric encryption tunnel wrapper
☆120Updated 4 years ago
Alternatives and similar repositories for CryptHook:
Users that are interested in CryptHook are comparing it to the libraries listed below
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆129Updated 6 years ago
- ☆65Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆54Updated 9 years ago
- Passive DHCP fingerprinting implementation☆50Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Scripts created by MRG Effitas☆42Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆58Updated 12 years ago
- A shellcode testing harness.☆69Updated 7 months ago
- Linux v4.x.x Rootkit☆88Updated 6 months ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- a linux process hacker tool☆83Updated 5 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- ☆113Updated 8 years ago
- Rootkit Detector for UNIX☆62Updated last year
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 5 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago