milabs / kiddy
Kiddy - (linux) kernel identity spoofer
☆13Updated 10 months ago
Alternatives and similar repositories for kiddy:
Users that are interested in kiddy are comparing it to the libraries listed below
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆24Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated last month
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 8 months ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated 11 months ago
- Checks for tpm vulnerabilities☆36Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- BINARLY Research Tools and PoCs☆35Updated 3 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ASUS wifi router RCE vulnerability☆15Updated 4 months ago
- A small PoC demonstrating TLS interception on both HTTP1 and HTTP2☆10Updated last year
- LKM Linux rootkit☆20Updated last year
- ☆24Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆42Updated last year
- Fuzz Network Traffic☆15Updated 3 weeks ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- x86_64 LKM linux rootkit☆15Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- A repository with UEFI research stuff☆13Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆32Updated last month
- Custom Binary Ninja Themes☆12Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- PAM Backdoor☆27Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 10 months ago
- A MBR Fuzzer☆28Updated 9 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 8 months ago
- ☆17Updated 10 months ago