Sandfly Linux Stealth Rootkit Decloaking Utility
☆108Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for sandfly-processdecloak
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
Sorting:
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆168Jun 11, 2024Updated last year
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆12May 6, 2020Updated 5 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 4 months ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Updated this week
- Anything Sysmon related from the MSTIC R&D team☆156Jun 8, 2024Updated last year
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- egrets monitors egress☆47Apr 12, 2020Updated 5 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,949Apr 7, 2024Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Event Trace Log file parser in pure Python☆150Nov 27, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,162Nov 14, 2020Updated 5 years ago
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- Detect strange memory regions and DLLs☆190Jan 20, 2022Updated 4 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Apr 8, 2025Updated 11 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Aims to identify sleeping beacons☆663Jan 25, 2026Updated last month
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- A binary analysis framework☆133Dec 17, 2020Updated 5 years ago