hackerschoice / bpfhacksLinks
eBPF hacks
☆187Updated 9 months ago
Alternatives and similar repositories for bpfhacks
Users that are interested in bpfhacks are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- nysm is a stealth post-exploitation container.☆258Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 7 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- ☆134Updated last year
- io_uring based rootkit☆233Updated 4 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆138Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆274Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- reverse shell using curl☆207Updated 6 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆193Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- WallEscape vulnerability in util-linux☆52Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 3 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆52Updated 6 months ago
- An automatic Blind ROP exploitation tool☆203Updated 2 years ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 2 months ago
- In-Memory Rootkit For Linux and BSD☆80Updated last month
- Mara is a userland pty/tty sniffer☆53Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆255Updated last year
- ☆55Updated 11 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆120Updated 4 months ago
- eBPF Memory Dump Tool☆85Updated 2 weeks ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆220Updated last year
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Collection of codes focused on Linux rootkits☆150Updated 3 weeks ago
- ☆215Updated last year