eBPF hacks
☆197Dec 12, 2024Updated last year
Alternatives and similar repositories for bpfhacks
Users that are interested in bpfhacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Feb 27, 2026Updated last month
- Linux Sleep Obfuscation☆113Jan 7, 2024Updated 2 years ago
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 9 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Dec 29, 2022Updated 3 years ago
- ☆189Nov 21, 2024Updated last year
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated last year
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Golang weaponization for red teamers.☆518Jan 17, 2024Updated 2 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆200Mar 18, 2026Updated last week
- ☆117Feb 3, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- PoCs for Kernelmode rootkit techniques research.☆435Nov 4, 2025Updated 4 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- Different methods to get current username without using whoami☆186Feb 12, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit tool implemented using ebpf.☆212Jun 4, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,422Jan 19, 2026Updated 2 months ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Jul 30, 2024Updated last year