Mara is a userland pty/tty sniffer
☆53Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for Mara
Users that are interested in Mara are comparing it to the libraries listed below
Sorting:
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆50Jun 28, 2022Updated 3 years ago
- stealth userland kit that doesn't use sys_clone/sys_execve call☆34Apr 10, 2025Updated 10 months ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- 一个基于golang的简单漏洞扫描器☆12Feb 2, 2024Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Windows、Linux持久化套件/Windows, Linux persistence suite☆18May 17, 2024Updated last year
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49May 28, 2024Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago