A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS
☆34Nov 24, 2022Updated 3 years ago
Alternatives and similar repositories for santa-linux
Users that are interested in santa-linux are comparing it to the libraries listed below
Sorting:
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- Userspace driver for Fancy Devices™☆10Jun 13, 2022Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- crashmon - A LLDB Based replacement for CrashWrangler☆47Nov 25, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Various Bro scripts☆37May 20, 2014Updated 11 years ago
- A C++ library that parses debug information encoded in BTF format☆28Apr 11, 2023Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- Windows event log anomaly detection powered by ATPA technologies☆26Dec 22, 2022Updated 3 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- ☆11Nov 13, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 3 months ago
- ☆11Feb 14, 2023Updated 3 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆30Jan 15, 2026Updated last month
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- ☆37Feb 12, 2018Updated 8 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago