sandflysecurity / sandfly-processdecloakLinks
Sandfly Linux Stealth Rootkit Decloaking Utility
☆100Updated 2 years ago
Alternatives and similar repositories for sandfly-processdecloak
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
Sorting:
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆73Updated 4 years ago
- bdvl☆113Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- ☆38Updated 4 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆88Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆58Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Golang PE injection on windows☆166Updated 3 years ago
- ☆169Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆76Updated 2 years ago
- ☆126Updated 2 years ago
- ☆113Updated 3 years ago
- ☆67Updated 2 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆77Updated 3 years ago
- ☆62Updated 11 months ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 2 years ago
- ☆52Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Managed code hooking template.☆108Updated 4 years ago
- ☆31Updated 3 years ago