stealth userland kit that doesn't use sys_clone/sys_execve call
☆34Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for degu-lib
Users that are interested in degu-lib are comparing it to the libraries listed below
Sorting:
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 10 months ago
- quake3 virtual machine disassembler☆16Dec 31, 2020Updated 5 years ago
- ☆47Dec 28, 2025Updated 2 months ago
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- ☆23Apr 21, 2022Updated 3 years ago
- A tool for patching binaries to use specific versions of glibc☆21Jun 16, 2019Updated 6 years ago
- "Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)☆22Oct 15, 2020Updated 5 years ago
- ☆27May 14, 2022Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆38Feb 4, 2025Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49May 28, 2024Updated last year
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- cloudflare socks5 server☆40Jul 18, 2025Updated 7 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- A collection of tools and schemas in Rust to analyze data on IPFS and BitSwap traces.☆10Dec 3, 2025Updated 3 months ago
- A (small) web exploit framework☆97Dec 26, 2025Updated 2 months ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- NATO Interoperability Standards and Profiles☆17Apr 12, 2024Updated last year
- Code snippets for bare-metal malware development☆98Feb 19, 2022Updated 4 years ago
- Olympic Games dashboard for the "Build-a-Dashboard" workshop at posit::conf(2024)☆12Aug 13, 2024Updated last year
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- IonQ iQuHACK 2024 Remote Challenge☆11Feb 3, 2024Updated 2 years ago
- ☆18Feb 18, 2026Updated 2 weeks ago
- An ANSI C library to parse and create PROXY protocol v1 and v2 headers☆13Apr 4, 2025Updated 11 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- a p2p socket proxy based on toxcore☆12Jun 7, 2016Updated 9 years ago
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated 2 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆35Feb 27, 2025Updated last year
- ☆13Jul 14, 2020Updated 5 years ago
- One file based map demo☆12Dec 1, 2023Updated 2 years ago
- Simple example of using binary websocket messages within Phoenix☆13Feb 26, 2021Updated 5 years ago