☆63Apr 10, 2023Updated 3 years ago
Alternatives and similar repositories for eBPFShield
Users that are interested in eBPFShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆116Jul 7, 2023Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆17Aug 24, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆91Aug 5, 2023Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- ☆13Oct 24, 2024Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆303Updated this week
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆21Jul 7, 2024Updated last year
- ☆18Mar 26, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16Oct 18, 2024Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Apr 2, 2026Updated last week
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 5 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 11 months ago
- A bunch of reverse engineering Binaries dedicated to practice.☆17Feb 14, 2026Updated last month
- ☆19Sep 18, 2023Updated 2 years ago
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆59Jul 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago