kunte0 / Opossum-Attack-PoCLinks
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS
☆13Updated 4 months ago
Alternatives and similar repositories for Opossum-Attack-PoC
Users that are interested in Opossum-Attack-PoC are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆94Updated 2 months ago
- eBPF Memory Dump Tool☆96Updated 4 months ago
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- BINARLY Research Tools and PoCs☆39Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆56Updated 9 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 6 months ago
- ☆39Updated last year
- A Windows Named Pipe Multi-tool / Proxy☆202Updated 2 weeks ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆157Updated 3 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- ☆20Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆76Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆100Updated 3 months ago
- ☆52Updated 8 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- rpv-web is a browser based frontend for the rpv library☆25Updated last month
- Modified version of PEAS client for offensive operations☆50Updated last month
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆74Updated 4 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆45Updated 2 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 8 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 9 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆92Updated 3 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- A simple Meterpreter stager written in Rust.☆43Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago