A C and Go /proc/pid/maps cloak of invisibilty for shared object files
☆21Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for sneaky_remap
Users that are interested in sneaky_remap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- H-E-B Curbside availability finder☆10Feb 6, 2021Updated 5 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- ☆11May 13, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- Parse SDDL strings☆37Apr 1, 2024Updated 2 years ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆18Oct 13, 2025Updated 5 months ago
- KittyLoader is a highly evasive loader written in C / Assembly☆261Sep 22, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆289Mar 29, 2026Updated last week
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- Minimal workflows☆21Mar 19, 2024Updated 2 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 10 months ago
- A hoontr must hoont☆107Nov 27, 2025Updated 4 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- A Rust template for writing Beacon Object Files (BOFs)☆118Feb 11, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆262Sep 23, 2025Updated 6 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 8 years ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆196Mar 30, 2026Updated last week
- Trusted Computing Software Stack open source implementation☆27May 17, 2012Updated 13 years ago
- Attack chain emulator. Write recipes for initial access easily☆22Feb 26, 2025Updated last year
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆37Nov 8, 2024Updated last year
- eBPF-https is an open source web application firewall (WAF)☆14Sep 11, 2024Updated last year
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 7 months ago
- ☆31Jul 26, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 4 months ago