hackerschoice / zapper
Zaps arguments and environment from the process list
β197Updated 10 months ago
Alternatives and similar repositories for zapper:
Users that are interested in zapper are comparing it to the libraries listed below
- An eBPFπ Keylogger with C2-based RCE payload deliveryβ215Updated last week
- eBPF hacksβ184Updated 3 months ago
- A minimal TLS 1.2 client implementation in a pure Bash scriptβ344Updated last year
- easylkb - Easy Linux Kernel Builderβ339Updated 8 months ago
- eBPF Port Knocking Toolβ232Updated last year
- Intercept stdin/stdout/stderr for any processβ198Updated 2 years ago
- reverse shell using curlβ205Updated 3 weeks ago
- Get root via TTY / TIOCSTI stuffingβ69Updated 8 months ago
- β133Updated 11 months ago
- Damn Vulnerable UEFIβ271Updated 6 months ago
- Utility to find hidden Linux kernel modulesβ144Updated 3 months ago
- In-Memory Rootkit For Linuxβ70Updated last month
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programsβ272Updated 2 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094β141Updated 11 months ago
- β405Updated 7 months ago
- NTP Exfiltration Toolβ139Updated last year
- DNS-over-ping(8)β124Updated 2 years ago
- A library for intercepting system callsβ71Updated 2 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β125Updated 2 years ago
- Tricking shells into interactive mode when local PTY's are not availableβ143Updated 2 years ago
- Execute ELF files without dropping them on diskβ491Updated 8 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binariesβ¦β183Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.β27Updated 8 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionβ89Updated last month
- β383Updated last week
- Make BASH stealthy and hacker friendly with lots of bash functionsβ241Updated this week
- π§Έ fully isolated honeypot ssh server using thrusshβ267Updated 4 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β124Updated 4 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.β116Updated last month
- WallEscape vulnerability in util-linuxβ51Updated 11 months ago