jfrog / cve-2024-3094-toolsLinks
☆44Updated last year
Alternatives and similar repositories for cve-2024-3094-tools
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
Sorting:
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- ☆135Updated last year
- ☆85Updated 2 years ago
- Utility to find hidden Linux kernel modules☆147Updated 4 months ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Hides message with invisible Unicode characters☆96Updated last year
- ☆97Updated last year
- Information for CVE-2024-3094☆53Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 11 months ago
- Example of CVE-2024-24576 use case.☆59Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 10 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 6 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- Anti-analysis tool that obfuscates ELF files☆36Updated 4 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Updated 3 years ago
- ☆49Updated 9 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆128Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated last month
- Pwning IPv6 Networks☆38Updated last month
- Packet crafting, injection and sniffing tool☆70Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Public repository containing materials for various malware-related streams.☆46Updated last month
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago