BPFDoor Scanner - Check for Compromised Hosts
☆44May 12, 2022Updated 3 years ago
Alternatives and similar repositories for bpfdoor-scanner
Users that are interested in bpfdoor-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small PoC for bpfdoor malware technique☆20Feb 2, 2024Updated 2 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- ☆18May 16, 2013Updated 12 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆20Mar 27, 2025Updated last year
- ☆25Aug 2, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- Flake Template for Haskell Projects☆26Apr 6, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small and fast AES cipher in safe Rust☆29Oct 1, 2023Updated 2 years ago
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆11Sep 10, 2022Updated 3 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- ☆38Mar 3, 2025Updated last year
- ☆18Mar 9, 2023Updated 3 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Oct 30, 2022Updated 3 years ago
- roundtrip-free Rust to JavaScript "remote method invocation" or "distributed objects" system☆13Jun 4, 2025Updated 10 months ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆27Nov 16, 2022Updated 3 years ago
- ☆27Feb 13, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆48Jul 13, 2021Updated 4 years ago
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated 3 months ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- Exploring retweets by Twitter bot-nets.☆11Aug 30, 2017Updated 8 years ago
- ☆36Sep 25, 2020Updated 5 years ago