Scripts to decloak Linux Loadable Kernel Module (LKM) stealth rootkits.
☆35Sep 28, 2025Updated 7 months ago
Alternatives and similar repositories for sandfly-kernel-module-decloak
Users that are interested in sandfly-kernel-module-decloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- ☆15Mar 21, 2025Updated last year
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 2 months ago
- API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs☆85Updated this week
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆20Jul 25, 2025Updated 9 months ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- fork from http://icmpshell.sourceforge.net☆15Nov 26, 2015Updated 10 years ago
- Repository for the home climate monitoring I built☆17Jul 9, 2019Updated 6 years ago
- Home of https://redteam.guide☆15Apr 1, 2026Updated 3 weeks ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 9 years ago
- Repository for Knowledge Centre Articles☆19Jan 23, 2023Updated 3 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 10 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🧞♂️ malware analysis☆40Mar 3, 2024Updated 2 years ago
- OCI Images derived of ublue-os main images for Framework hardware☆14Feb 26, 2024Updated 2 years ago
- An simple HTML dogecoin donate button☆13Jun 19, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆18Feb 27, 2026Updated 2 months ago
- Counting fish using Raspberry Pi camera and OpenCV-Python☆16Feb 15, 2016Updated 10 years ago
- Base service class from Assemblyline 4☆15Updated this week
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Arm assembly Language Server. This is a mirror repository.☆34Dec 18, 2025Updated 4 months ago
- Various scripts & tools☆12Apr 22, 2024Updated 2 years ago
- ☆16Sep 5, 2024Updated last year
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆77Jul 29, 2025Updated 9 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)☆32Apr 1, 2025Updated last year
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago