Scripts to decloak Linux Loadable Kernel Module (LKM) stealth rootkits.
☆35Sep 28, 2025Updated 6 months ago
Alternatives and similar repositories for sandfly-kernel-module-decloak
Users that are interested in sandfly-kernel-module-decloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- Small scripts to help with Linux forensics and incident response.☆56Sep 29, 2025Updated 6 months ago
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Trusted Automated Private Platform as a Service☆22Apr 2, 2026Updated last week
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- minimal hypervisor for aarch64 (WIP)☆31Nov 29, 2025Updated 4 months ago
- Repository for the home climate monitoring I built☆17Jul 9, 2019Updated 6 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- Repository for Knowledge Centre Articles☆19Jan 23, 2023Updated 3 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- An simple HTML dogecoin donate button☆13Jun 19, 2022Updated 3 years ago
- Self-host your own digital island☆28Mar 31, 2026Updated last week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆17Feb 27, 2026Updated last month
- Counting fish using Raspberry Pi camera and OpenCV-Python☆16Feb 15, 2016Updated 10 years ago
- Base service class from Assemblyline 4☆15Apr 1, 2026Updated last week
- emfnoc network utilities and configuration☆18Jul 18, 2025Updated 8 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 5 months ago
- Arm assembly Language Server. This is a mirror repository.☆34Dec 18, 2025Updated 3 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 11 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- JKClient is an assetsless client for Jedi Knight: Jedi Academy and Jedi Knight II: Jedi Outcast games☆12Feb 10, 2026Updated last month
- OpenVoiceOS Voice Satellite☆21Feb 2, 2026Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆74Jul 29, 2025Updated 8 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 3 months ago