A small PoC for bpfdoor malware technique
☆20Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for bpfdoorpoc
Users that are interested in bpfdoorpoc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept exploit for Python Security Consideration "logging: Logging configuration uses eval()"☆14Jun 8, 2022Updated 3 years ago
- BPFDoor Scanner - Check for Compromised Hosts☆44May 12, 2022Updated 3 years ago
- BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen☆265May 11, 2022Updated 3 years ago
- 🍃 Spring web and Data using JPA, MySQL Driver and Lombok to manage football games, for that I have used the full logic to deal with Game…☆21Mar 23, 2026Updated last week
- 숭실대학교 컴퓨터학부 3학년 리눅스시스템프로그래밍☆14Nov 24, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Rob Pike's simple regex matcher converted to Go☆11Aug 14, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)☆20May 30, 2021Updated 4 years ago
- ChaCha20 + Poly1305☆27Apr 30, 2016Updated 9 years ago
- mmdpipy☆11Nov 28, 2021Updated 4 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Source code for Adobe Commerce Web APIs developer documentation☆13Updated this week
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- compare training duration of CNN with CPU (i7 8550U) vs GPU (mx150) with CUDA depending on batch size☆12Mar 24, 2018Updated 8 years ago
- eBPF-https is an open source web application firewall (WAF)☆14Sep 11, 2024Updated last year
- High reliability asynchronous task queue using mysql☆10May 7, 2021Updated 4 years ago
- ☆19Mar 27, 2025Updated last year
- ☆13Sep 26, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- Color-changing live wallpaper with Java and OpenGL.☆18Dec 5, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- ReactJS context menu component, that doesn't break native browser actions☆12Dec 29, 2020Updated 5 years ago
- Clone of sharphsql.codeplex.com at Commit 80132 (2012-10-02)☆13Dec 15, 2015Updated 10 years ago
- Flake Template for Haskell Projects☆26Updated this week
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 3 months ago
- Simple implementation of 256 bit AES encryption in GCM mode.☆23Jan 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆12Sep 10, 2022Updated 3 years ago
- Send GKE audit events to falco☆12Jan 8, 2023Updated 3 years ago
- Compressed Bitmap in C++ for bitmap Indexes.☆11Dec 17, 2019Updated 6 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- ArtSpeech: Adaptive Text-to-Speech Synthesis with Articulatory Representations☆21Sep 21, 2025Updated 6 months ago
- A P2P DHT engine inspired by kademlia algorithm, written in c# completely from scratch using dotnet 4.0 framework.☆14May 20, 2016Updated 9 years ago
- ezTrans Web Wrapper☆14Aug 8, 2023Updated 2 years ago