sandflysecurity / sandfly-processdecloakLinks
Sandfly Linux Stealth Rootkit Decloaking Utility
☆102Updated 2 years ago
Alternatives and similar repositories for sandfly-processdecloak
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
Sorting:
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- bdvl☆114Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- ☆80Updated 3 years ago
- Golang PE injection on windows☆168Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ☆64Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- An evil bit backdoor for iptables☆53Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- volatility explorer☆91Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- Execute MachO binaries in memory using CGo☆81Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- pypykatz plugin for volatility3 framework☆42Updated 2 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆58Updated 3 years ago