Linux Process Injection via Seccomp Notifier
☆84Dec 9, 2025Updated 3 months ago
Alternatives and similar repositories for seccomp-notify-injection
Users that are interested in seccomp-notify-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆70Jan 19, 2026Updated 2 months ago
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- ☆31Sep 12, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Windows Session Hijacking via COM☆342Dec 13, 2025Updated 3 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- Linux Shared Library to Shellcode Loader☆89Feb 15, 2026Updated last month
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- A reflective DLL development template for the Rust programming language☆116Nov 4, 2025Updated 4 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated last month
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A cross-platform C++ framework for building Windows shellcode☆163Mar 4, 2026Updated 3 weeks ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- tests to catch some sloppy hv impls☆34Mar 16, 2026Updated last week
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- Host CLR and run .NET binaries using Rust☆153Dec 23, 2025Updated 3 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆167May 28, 2025Updated 9 months ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆87Jan 21, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated last year
- ☆40Feb 12, 2026Updated last month
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- Self-mutating macOS implant☆126Mar 16, 2026Updated last week
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆105Feb 10, 2026Updated last month
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 7 months ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆191Mar 19, 2026Updated last week
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆743Jul 22, 2023Updated 2 years ago
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated 2 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago