☆40Sep 17, 2016Updated 9 years ago
Alternatives and similar repositories for kcap
Users that are interested in kcap are comparing it to the libraries listed below
Sorting:
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- SystemGap - Maintenance Tools after privilege escalation☆47Jan 4, 2026Updated 2 months ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 7 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- ☆14May 8, 2017Updated 8 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆16Jul 20, 2017Updated 8 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago