sandflysecurity / sandfly-processdecloak
Sandfly Linux Stealth Rootkit Decloaking Utility
☆95Updated 2 years ago
Alternatives and similar repositories for sandfly-processdecloak:
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 3 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆219Updated 5 years ago
- bdvl☆112Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- Mara is a userland pty/tty sniffer☆52Updated last year
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆63Updated 2 years ago
- ☆52Updated 3 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆67Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆157Updated 3 months ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆67Updated 2 years ago
- ☆165Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated 2 weeks ago
- Golang PE injection on windows☆163Updated 3 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆64Updated 6 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago