sandflysecurity / sandfly-processdecloakLinks
Sandfly Linux Stealth Rootkit Decloaking Utility
☆105Updated 2 years ago
Alternatives and similar repositories for sandfly-processdecloak
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
Sorting:
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- bdvl☆114Updated 3 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆89Updated last month
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- ☆67Updated 2 years ago
- Golang PE injection on windows☆168Updated 4 years ago
- WhiteBeam: Transparent endpoint security☆100Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- ☆64Updated last year
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆187Updated 8 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago