BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen
☆270May 11, 2022Updated 3 years ago
Alternatives and similar repositories for BPFDoor
Users that are interested in BPFDoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BPFDoor Scanner - Check for Compromised Hosts☆44May 12, 2022Updated 3 years ago
- A small PoC for bpfdoor malware technique☆20Feb 2, 2024Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- RPC 调用添加ssp扩展dump lsass☆24Aug 16, 2022Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- ☆10Mar 3, 2024Updated 2 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆31Feb 4, 2026Updated 2 months ago
- CTFd Challenge Type which decreases its value after every solve☆18Feb 1, 2019Updated 7 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆142Jul 21, 2025Updated 8 months ago
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Conti Ransomware malware leak WITH LOCKER☆25Mar 5, 2022Updated 4 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Updated this week
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- ☆18Nov 23, 2023Updated 2 years ago
- ☆47May 13, 2024Updated last year
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆31Nov 9, 2021Updated 4 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- Python script for sending e-mails with CVE-2023-23397 payload using SMTP☆14Mar 22, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2024-30090 - LPE PoC☆107Oct 17, 2024Updated last year
- Batch script to compile a binary shellcode blob into an exe file☆90Jul 12, 2019Updated 6 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆32Nov 14, 2025Updated 5 months ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- ☆42Mar 12, 2025Updated last year
- Vulnerability analysis and proof of concepts☆40May 15, 2023Updated 2 years ago
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆28Dec 14, 2024Updated last year
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- ☆34Apr 14, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 5 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Hive, a major component of the CIA infrastructure to control its malware.☆17Dec 26, 2017Updated 8 years ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆274Jun 18, 2025Updated 10 months ago
- Backdooring VSCode Projects☆130Jun 5, 2025Updated 10 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago