milabs / kiddyLinks
Kiddy - (linux) kernel identity spoofer
☆15Updated last year
Alternatives and similar repositories for kiddy
Users that are interested in kiddy are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆25Updated last year
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆28Updated last year
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Updated 11 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆39Updated last year
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆93Updated 3 months ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆20Updated 10 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- PAM Backdoor☆33Updated 2 years ago
- Packet crafting, injection and sniffing tool☆71Updated 5 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆11Updated 3 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated last month
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- yet another hidden LKM hunter☆29Updated 3 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆56Updated 2 years ago
- ☆40Updated 3 weeks ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago
- ☆25Updated last year
- ☆24Updated 3 years ago
- hiding in plain sight: part 2☆45Updated last year
- Network Traffic Fuzzer☆17Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago