kunte0 / Opossum-Attack-PoCLinks
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS
☆12Updated last week
Alternatives and similar repositories for Opossum-Attack-PoC
Users that are interested in Opossum-Attack-PoC are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆66Updated 3 months ago
- ☆49Updated 4 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆118Updated 3 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆135Updated last year
- Proof-of-Concept for CVE-2024-26218☆52Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- ☆19Updated last month
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- ☆64Updated last year
- ☆36Updated last year
- eBPF Memory Dump Tool☆82Updated last month
- In-Memory Rootkit For Linux☆72Updated this week
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆50Updated 4 months ago
- ☆37Updated 7 months ago
- Convert your shellcode into an ASCII string☆102Updated last month
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- .NET tool used to enrich RPC telemetry☆95Updated last month
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 2 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 4 months ago
- "Service-less" driver loading☆157Updated 8 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆51Updated 3 weeks ago