eBPF hacks
☆198Dec 12, 2024Updated last year
Alternatives and similar repositories for bpfhacks
Users that are interested in bpfhacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆339Feb 27, 2026Updated last month
- Linux Sleep Obfuscation☆115Jan 7, 2024Updated 2 years ago
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 9 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 4 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Dec 29, 2022Updated 3 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 5 years ago
- ☆193Nov 21, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆186Jan 27, 2024Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- Golang weaponization for red teamers.☆519Jan 17, 2024Updated 2 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆203Apr 9, 2026Updated last week
- ☆118Feb 3, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Nameless C2 - A C2 with all its components written in Rust☆286Sep 26, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 3 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- PoCs for Kernelmode rootkit techniques research.☆437Mar 25, 2026Updated 3 weeks ago
- ☆18Mar 26, 2024Updated 2 years ago
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- Different methods to get current username without using whoami☆185Feb 12, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit tool implemented using ebpf.☆212Jun 4, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Apr 7, 2026Updated last week
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- ASLR bypass without infoleak☆167Nov 2, 2021Updated 4 years ago