milabs / kiddyLinks
Kiddy - (linux) kernel identity spoofer
☆13Updated last year
Alternatives and similar repositories for kiddy
Users that are interested in kiddy are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- yet another hidden LKM hunter☆24Updated last year
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆25Updated last year
- Fuzz Network Traffic☆18Updated 6 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Packet crafting, injection and sniffing tool☆66Updated this week
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- Detect and remove the presence of canary tokens☆22Updated last year
- Decrypt encrypted SonicOSX firmware images☆16Updated 4 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- PAM Backdoor☆28Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ☆25Updated last year
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆24Updated 10 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 5 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- masscan with exclusive excludes☆57Updated last year
- ☆24Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago