BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen
☆263May 11, 2022Updated 3 years ago
Alternatives and similar repositories for BPFDoor
Users that are interested in BPFDoor are comparing it to the libraries listed below
Sorting:
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- RPC 调用添加ssp扩展dump lsass☆24Aug 16, 2022Updated 3 years ago
- Korean Patcher for Old Minecraft versions!☆21Apr 11, 2022Updated 3 years ago
- Backend server of Webauthn demo page written in Go language☆15Jul 24, 2022Updated 3 years ago
- Vulnerability analysis and proof of concepts☆38May 15, 2023Updated 2 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- ☆47May 13, 2024Updated last year
- 免杀生成aspx的脚本☆26Sep 22, 2024Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- Linux Shared Library to Shellcode Loader☆84Feb 15, 2026Updated 2 weeks ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Jul 21, 2025Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Backdooring VSCode Projects☆126Jun 5, 2025Updated 9 months ago
- Re-implement cmd.exe using windows api☆50Feb 7, 2023Updated 3 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Oct 19, 2025Updated 4 months ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- 100% stream-based O(n) syntax highlighter for ANSI terminal☆11Dec 4, 2024Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- MuddyWater C2 framework research☆12Jun 28, 2023Updated 2 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A bot to get perfect score for the Fruit Box game☆12Apr 20, 2023Updated 2 years ago
- ☆11Sep 30, 2023Updated 2 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- 将任何 elf 或命令转换为 shellcode☆61Mar 20, 2024Updated last year
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆28Dec 14, 2024Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- 레나 오픈소스 프로젝트☆10Feb 11, 2026Updated 3 weeks ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago