Example of hooking a linux systemcall
☆63Dec 7, 2017Updated 8 years ago
Alternatives and similar repositories for superhide
Users that are interested in superhide are comparing it to the libraries listed below
Sorting:
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆18Jul 30, 2018Updated 7 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- The GA-IDS is a full-fledged host based intrusion detection system developed using the Java programming language to help detect packets h…☆12Feb 27, 2019Updated 7 years ago
- Automatic reversed shell detecting and defensing☆52Oct 25, 2018Updated 7 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- Web scan foundation framework☆23Nov 17, 2017Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- 一个xss利用平台☆18Jun 1, 2014Updated 11 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Linux BootKit☆32Sep 11, 2017Updated 8 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- 用于扫描git,svn泄露☆11Jul 29, 2015Updated 10 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆29Aug 18, 2014Updated 11 years ago
- Yet Another Web Spider☆76Apr 28, 2017Updated 8 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago