recontech404 / Kairos
Open Source eBPF Malware Analysis Framework
☆48Updated 6 months ago
Alternatives and similar repositories for Kairos
Users that are interested in Kairos are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆68Updated this week
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 11 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆44Updated 2 months ago
- kubernetes rootkit☆31Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 3 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆58Updated 5 months ago
- ☆28Updated 3 months ago
- Monarch - The Adversary Emulation Toolkit☆62Updated 4 months ago
- ☆30Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 3 months ago
- Malware Analysis tools☆26Updated 8 months ago
- A simple Meterpreter stager written in Rust.☆38Updated 8 months ago
- ☆59Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆40Updated last month
- ☆46Updated last month
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated last month
- ☆16Updated 8 months ago
- a tiny program to consume from ETW providers for research☆48Updated 4 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆58Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated this week
- ☆18Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated 2 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- BINARLY Research Tools and PoCs☆36Updated 7 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- ☆39Updated last year
- ☆105Updated 6 months ago
- ☆33Updated last year