Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
☆1,668Oct 19, 2023Updated 2 years ago
Alternatives and similar repositories for boopkit
Users that are interested in boopkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,960Apr 7, 2024Updated 2 years ago
- Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework☆175Apr 20, 2023Updated 3 years ago
- ebpfkit is a rootkit powered by eBPF☆844Feb 28, 2023Updated 3 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆683Jul 7, 2024Updated last year
- A Linux Host-based Intrusion Detection System based on eBPF.☆456Dec 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- a drop-in replacement for Nmap powered by shodan.io☆3,226Apr 13, 2026Updated last month
- Credentials Dumper for Linux using eBPF☆1,157Sep 9, 2024Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆141Feb 28, 2023Updated 3 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- awesome-linux-rootkits☆2,065Feb 15, 2026Updated 3 months ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated 2 weeks ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,703May 2, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,660May 1, 2026Updated 3 weeks ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,267Oct 2, 2020Updated 5 years ago
- /root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.☆351Feb 5, 2023Updated 3 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆578Jun 7, 2022Updated 3 years ago
- Linux EDR written in Golang and based on eBPF.☆248May 24, 2022Updated 3 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,325Apr 27, 2026Updated 3 weeks ago
- ☆321May 16, 2022Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,114Sep 17, 2024Updated last year
- eBPF-based Security Observability and Runtime Enforcement☆4,676May 15, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,133Mar 12, 2024Updated 2 years ago
- A cross platform C2/post-exploitation framework.☆710Oct 8, 2022Updated 3 years ago
- Red-Team LKM☆641May 13, 2026Updated last week
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆134Sep 19, 2021Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,590Jul 8, 2025Updated 10 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,234Aug 18, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,472Aug 18, 2023Updated 2 years ago
- Converts PE into a shellcode☆2,761Aug 30, 2025Updated 8 months ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆889Mar 21, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dectect syscall hooking using eBPF☆170Apr 28, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆2,011Jan 1, 2023Updated 3 years ago
- Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.☆15,167Updated this week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,389Oct 27, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,016Jun 4, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year