x86_64 LKM linux rootkit
☆16Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for dolus
Users that are interested in dolus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Graphical map of known Advanced Persistent Threats☆63Jan 31, 2026Updated last month
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- A loader for DOS-like .com executables on Linux☆10Aug 25, 2016Updated 9 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Dec 1, 2025Updated 3 months ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- Super fast duplicate file finder written in Golang.☆44Mar 16, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proof of Concept: HTTP/2 CONTINUATION Flood☆10Apr 7, 2024Updated last year
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- Simple rust fuzzer☆23Mar 17, 2021Updated 5 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- ☆13Feb 22, 2024Updated 2 years ago
- Simple ELF runtime packer for creating self-protecting binaries☆22Aug 16, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- ☆12Sep 22, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- A parser for Microsoft PDB (Program Database) debugging information☆23Nov 5, 2024Updated last year
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- MeshCentral control module for developers☆14Sep 24, 2025Updated 6 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- ☆22Sep 1, 2016Updated 9 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆17Jan 20, 2023Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆108Feb 2, 2025Updated last year
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- :+1: Useful shell scripts in one place☆13Dec 30, 2025Updated 2 months ago