milabs / kiddy
Kiddy - (linux) kernel identity spoofer
☆12Updated last year
Alternatives and similar repositories for kiddy:
Users that are interested in kiddy are comparing it to the libraries listed below
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 11 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- A C# Tool to gather information about email breaches☆14Updated last year
- Fuzz Network Traffic☆18Updated 3 months ago
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆24Updated last year
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆23Updated 7 months ago
- Decrypt encrypted SonicOSX firmware images☆11Updated last month
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆20Updated 3 weeks ago
- yet another hidden LKM hunter☆20Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- ☆25Updated 10 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆19Updated this week
- hiding in plain sight: part 2☆44Updated 8 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆23Updated last month
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆8Updated 10 months ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- LKM Linux rootkit☆20Updated last year
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- ☆23Updated 10 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year