recontech404 / Kairos
Open Source eBPF Malware Analysis Framework
☆41Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Kairos
- ☆58Updated 7 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 5 months ago
- ☆20Updated this week
- Powershell Linter☆46Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆21Updated 2 weeks ago
- ☆68Updated last year
- Malware Analysis tools☆25Updated last month
- ☆31Updated 5 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆32Updated 2 months ago
- Java archive implant toolkit.☆53Updated 2 months ago
- BINARLY Research Tools and PoCs☆34Updated last month
- Aplos an extremely simple fuzzer for Windows binaries.☆66Updated 7 months ago
- kubernetes rootkit☆28Updated 10 months ago
- ☆37Updated 9 months ago
- Slide of my conference presentations☆11Updated 2 months ago
- Golang bindings for PE-sieve☆40Updated last year
- Automated vulnerability discovery and annotation☆56Updated 3 months ago
- ☆28Updated 5 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆32Updated last month
- ☆18Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 6 months ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆23Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆22Updated 2 months ago
- V8sandbox_bypass using stack misalignment☆18Updated 2 months ago
- Dont Gamble with Risk☆14Updated 8 months ago
- Small tool to play with IOCs caused by Imageload events☆37Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆30Updated last week