eBPF Memory Dump Tool
☆100Feb 26, 2026Updated this week
Alternatives and similar repositories for lemon
Users that are interested in lemon are comparing it to the libraries listed below
Sorting:
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆172Nov 11, 2024Updated last year
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆54Jan 29, 2025Updated last year
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 2 months ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 2 months ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Deep Linux runtime visibility meets Wireshark☆304Nov 13, 2025Updated 3 months ago
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 2 months ago
- ☆90Feb 12, 2025Updated last year
- io_uring based rootkit☆250Apr 24, 2025Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Make your programs stealthier🐝☆202Jun 12, 2025Updated 8 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆109Feb 23, 2026Updated last week
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Multitool for Windows native find + replace bytes in hex format☆16Jan 22, 2026Updated last month
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated 2 weeks ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Dec 20, 2025Updated 2 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 9 months ago
- Bump your ida python script automatically!☆31Apr 19, 2025Updated 10 months ago
- ☆53Oct 27, 2024Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- Proof Of Concepts☆55Jan 4, 2026Updated last month
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- The most complete code auditing platform with thousands of real-world challenges☆136Jun 21, 2025Updated 8 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Updated this week
- A very simple open source implementation of Google's Project Naptime☆182Mar 27, 2025Updated 11 months ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago