chumachok / cat-soup
ebpf covert channel rootkit
☆14Updated last year
Alternatives and similar repositories for cat-soup:
Users that are interested in cat-soup are comparing it to the libraries listed below
- Beacon Debugger☆40Updated 5 months ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 6 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆51Updated last year
- Proofs-Of-360Security Sandbox Escape☆10Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- ☆39Updated 9 months ago
- ☆15Updated 2 years ago
- Hide Port In Windows☆38Updated 5 months ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 2 years ago
- ☆20Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 10 months ago
- LPE of CVE-2024-26230☆23Updated 7 months ago
- VM Escape for Parallels Desktop <18.1.1☆37Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆44Updated last year
- kubernetes rootkit☆31Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆22Updated 2 months ago
- ☆26Updated 3 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Updated 4 years ago
- Proof-of-Concept for CVE-2024-21345☆72Updated 11 months ago
- ☆21Updated 11 months ago
- ☆58Updated last year
- ☆34Updated 11 months ago
- Exploit for LPE in ZoneAlarm Antivirus/Firewall☆32Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated last year
- works but not work, cao!☆24Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year