Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2
☆51Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for freebsd-rootkits
Users that are interested in freebsd-rootkits are comparing it to the libraries listed below
Sorting:
- All ROPemporium binaries categorized by architecture, with solving scripts and custom flags☆25May 21, 2023Updated 2 years ago
- Tools for inspecting YARA bytecode☆21Jul 1, 2020Updated 5 years ago
- ☆12Nov 12, 2022Updated 3 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Small Rust programs that do weird things☆30Feb 13, 2026Updated 3 weeks ago
- ☆21Feb 20, 2014Updated 12 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- From IoT Pentesting to IoT Security☆23Jan 11, 2019Updated 7 years ago
- CTF writeups☆18Feb 21, 2026Updated 2 weeks ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Linux Kernel Hacking☆750Apr 10, 2024Updated last year
- Content related to hardware hacking☆56Mar 28, 2019Updated 6 years ago
- LLDB based debugger for Linux Kernel☆28Apr 5, 2025Updated 11 months ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Nov 19, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Mar 18, 2015Updated 10 years ago
- Obfuscates dynamic symbol table☆135Jan 10, 2019Updated 7 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- A training course for BambooFox☆25Mar 18, 2016Updated 9 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Jan 22, 2022Updated 4 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Mar 2, 2024Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆221Aug 12, 2020Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Pomodoro timer using React Native☆10Jun 3, 2020Updated 5 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago