milabs / kiddyLinks
Kiddy - (linux) kernel identity spoofer
☆15Updated last year
Alternatives and similar repositories for kiddy
Users that are interested in kiddy are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆70Updated last month
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- ☆25Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- PAM Backdoor☆30Updated 2 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Packet crafting, injection and sniffing tool☆68Updated 2 months ago
- BINARLY Research Tools and PoCs☆37Updated last year
- ☆25Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 7 months ago
- hiding in plain sight: part 2☆45Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆64Updated 10 months ago
- yet another hidden LKM hunter☆27Updated last week
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- A C# Tool to gather information about email breaches☆15Updated last year
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- masscan with exclusive excludes☆58Updated last year
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Updated 8 months ago
- Network Traffic Fuzzer☆18Updated 8 months ago