yet another hidden LKM hunter
☆32Sep 18, 2025Updated 6 months ago
Alternatives and similar repositories for nitara2
Users that are interested in nitara2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- ☆19Mar 22, 2025Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆80Dec 16, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 11 months ago
- Generate Volatility3 profiles from BTF.☆31Dec 21, 2024Updated last year
- ☆15Updated this week
- Red-Team LKM☆636Dec 16, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An ELF parser written fully in NASM.☆12Oct 20, 2025Updated 5 months ago
- LD_PRELOAD Rootkit☆309Apr 5, 2025Updated 11 months ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- ☆54Mar 26, 2025Updated last year
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Advanced In-Memory PowerShell Process Injection Framework☆73Jul 16, 2025Updated 8 months ago
- MFS and CFG file manipulation utility☆32Feb 14, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆56Jul 2, 2023Updated 2 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆23Jan 15, 2019Updated 7 years ago
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆45Nov 6, 2025Updated 4 months ago
- Project Trellis database☆14Sep 15, 2025Updated 6 months ago
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 7 months ago
- Render *.drawio files to PNG or PDF files in a GitHub Action☆15Sep 18, 2023Updated 2 years ago
- iTLB multihit PoC☆43Nov 4, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Mar 18, 2015Updated 11 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Mar 10, 2025Updated last year
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 11 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆15Jan 13, 2026Updated 2 months ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago