Intercept stdin/stdout/stderr for any process
☆202Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for siphon
Users that are interested in siphon are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- In-memory filesystem implementation of io/fs.FS☆95Aug 30, 2023Updated 2 years ago
- Analyse binaries for missing security features, information disclosure and more...☆87Aug 7, 2023Updated 2 years ago
- Run binaries straight from memory in Linux☆322Apr 17, 2023Updated 2 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- GIFs in your terminal☆55Feb 25, 2023Updated 3 years ago
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆672Jul 27, 2022Updated 3 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- It's strace, with colours.☆285Nov 7, 2022Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆879Mar 21, 2025Updated 11 months ago
- Go HackerOne API Client☆11May 16, 2024Updated last year
- The last kubernetes tool you'll ever need.☆17May 28, 2025Updated 9 months ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- A PoC .NET-specific process injection tool☆58Mar 17, 2024Updated last year
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- ☆137Jun 21, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Credentials Dumper for Linux using eBPF☆1,158Sep 9, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105May 5, 2023Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- ☆615Feb 5, 2026Updated 3 weeks ago
- Tables for terminals, in Go.☆123Jul 13, 2025Updated 7 months ago
- ☆57Apr 19, 2023Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago