Scripts to decloak Linux Loadable Kernel Module (LKM) stealth rootkits.
☆35Sep 28, 2025Updated 5 months ago
Alternatives and similar repositories for sandfly-kernel-module-decloak
Users that are interested in sandfly-kernel-module-decloak are comparing it to the libraries listed below
Sorting:
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- ☆15Mar 21, 2025Updated 11 months ago
- Trusted Automated Private Platform as a Service☆22Mar 10, 2026Updated last week
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 7 months ago
- WoW client modification to record client and server packets☆12Jan 7, 2016Updated 10 years ago
- minimal hypervisor for aarch64 (WIP)☆31Nov 29, 2025Updated 3 months ago
- Plugin designed to expedite your 3D printing process. It smartly reduces unnecessary Auto Bed Leveling (ABL) actions☆12Jan 1, 2026Updated 2 months ago
- torbsd web pages☆13Sep 6, 2018Updated 7 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Jedi Academy server solution without any headaches. With RTVRTM. Dockerized.☆11Mar 10, 2018Updated 8 years ago
- 🧞♂️ malware analysis☆40Mar 3, 2024Updated 2 years ago
- OCI Images derived of ublue-os main images for Framework hardware☆14Feb 26, 2024Updated 2 years ago
- An simple HTML dogecoin donate button☆13Jun 19, 2022Updated 3 years ago
- Simple Gulp 5 functions for copying USWDS static assets and transforming USWDS Sass into browser-readable CSS.☆26Mar 6, 2026Updated last week
- Self-host your own digital island☆26Feb 9, 2026Updated last month
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆16Feb 27, 2026Updated 2 weeks ago
- emfnoc network utilities and configuration☆18Jul 18, 2025Updated 8 months ago
- Base service class from Assemblyline 4☆15Updated this week
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated 11 months ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- Firmware for the Croco Cartridge V2☆27Jul 29, 2025Updated 7 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Jul 29, 2025Updated 7 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 3 months ago