kargisimos / dolus
x86_64 LKM linux rootkit
☆16Updated last year
Alternatives and similar repositories for dolus:
Users that are interested in dolus are comparing it to the libraries listed below
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆12Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- ☆18Updated 6 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 3 weeks ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Some good things for EXP-301 course☆11Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- ☆21Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- string encryption in Nim☆19Updated 10 months ago
- ☆13Updated 3 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 6 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- A simple to use single-include Windows API resolver☆21Updated 9 months ago
- A kernel driver to get a Handle to virtually *every* process☆13Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 9 months ago
- ☆19Updated last year