kunte0 / Opossum-Attack-PoCLinks
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS
☆15Updated 2 months ago
Alternatives and similar repositories for Opossum-Attack-PoC
Users that are interested in Opossum-Attack-PoC are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆86Updated last month
- Userland exec PoC to be used as attack vector technique☆88Updated 2 weeks ago
- Open Source eBPF Malware Analysis Framework☆51Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆56Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆72Updated 9 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 3 weeks ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆52Updated 6 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- Obex – Blocking unwanted DLLs in user mode☆123Updated 2 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- ☆38Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 3 months ago
- A Payload Analysis Framework☆85Updated 3 months ago
- ☆50Updated 6 months ago
- ☆19Updated last month
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆74Updated last week
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆81Updated 3 weeks ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆126Updated 4 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆70Updated last month
- ☆75Updated 2 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 3 months ago
- A simple Meterpreter stager written in Rust.☆40Updated last week
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Updated 7 months ago
- Convert your shellcode into an ASCII string☆119Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆125Updated 5 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆26Updated last week
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year