sandflysecurity / sandfly-processdecloak
Sandfly Linux Stealth Rootkit Decloaking Utility
☆99Updated 2 years ago
Alternatives and similar repositories for sandfly-processdecloak:
Users that are interested in sandfly-processdecloak are comparing it to the libraries listed below
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆72Updated 4 years ago
- bdvl☆113Updated 3 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Ingest openldap data into bloodhound☆79Updated 4 years ago
- Golang PE injection on windows☆167Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Static based decoders for malware samples☆93Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- ☆167Updated 3 years ago
- ☆52Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆165Updated last month
- ☆60Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆72Updated 3 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- ☆38Updated 4 years ago