hackerschoice / bpfhacks
eBPF hacks
☆184Updated 3 months ago
Alternatives and similar repositories for bpfhacks:
Users that are interested in bpfhacks are comparing it to the libraries listed below
- Get root via TTY / TIOCSTI stuffing☆70Updated 8 months ago
- Userland exec PoC to be used as attack vector technique☆81Updated last month
- nysm is a stealth post-exploitation container.☆245Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆256Updated 2 weeks ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆89Updated last month
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆272Updated 2 months ago
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆187Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆140Updated 6 months ago
- Collection of codes focused on Linux rootkits☆92Updated 3 weeks ago
- ☆55Updated 5 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆218Updated 10 months ago
- In-Memory Rootkit For Linux☆70Updated last month
- Linpmem is a linux memory acquisition tool☆78Updated 10 months ago
- WallEscape vulnerability in util-linux☆51Updated 11 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆154Updated 6 months ago
- reverse shell using curl☆205Updated last month
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆185Updated 5 months ago
- Signing-key abuse and update exploitation framework☆123Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- LD_PRELOAD rootkit☆129Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆215Updated 3 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated last year
- ☆115Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆206Updated 2 months ago
- Apply a divide and conquer approach to bypass EDRs☆279Updated last year
- An automatic Blind ROP exploitation tool☆199Updated last year
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- Nameless C2 - A C2 with all its components written in Rust☆263Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆52Updated 3 months ago
- Reaping treasures from strings in remote processes memory☆246Updated last month