hackerschoice / bpfhacksLinks
eBPF hacks
☆188Updated 7 months ago
Alternatives and similar repositories for bpfhacks
Users that are interested in bpfhacks are comparing it to the libraries listed below
Sorting:
- nysm is a stealth post-exploitation container.☆252Updated 3 weeks ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- Userland exec PoC to be used as attack vector technique☆85Updated 5 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆270Updated 4 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- ☆134Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 2 weeks ago
- WallEscape vulnerability in util-linux☆51Updated last year
- io_uring based rootkit☆215Updated 2 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- reverse shell using curl☆206Updated 4 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆50Updated 4 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆193Updated 9 months ago
- Signing-key abuse and update exploitation framework☆129Updated last month
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- In-Memory Rootkit For Linux☆71Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 10 months ago
- ☆55Updated 9 months ago
- LD_PRELOAD rootkit☆133Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 8 months ago
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆249Updated 2 weeks ago
- Linpmem is a linux memory acquisition tool☆85Updated 3 weeks ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated last week
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆159Updated 10 months ago