BPFDoor Scanner - Check for Compromised Hosts
☆44May 12, 2022Updated 3 years ago
Alternatives and similar repositories for bpfdoor-scanner
Users that are interested in bpfdoor-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Sep 26, 2020Updated 5 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- conti locker ransomware source code leak☆30Mar 5, 2022Updated 4 years ago
- idax: IDASDK extension libraries☆23Oct 12, 2025Updated 5 months ago
- Very simple and fast Minecraft server status library using the Server List Ping protocol☆11Feb 12, 2023Updated 3 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Oct 30, 2022Updated 3 years ago
- roundtrip-free Rust to JavaScript "remote method invocation" or "distributed objects" system☆13Jun 4, 2025Updated 9 months ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated 2 months ago
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Sep 2, 2021Updated 4 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- ☆35Sep 25, 2020Updated 5 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- ☆25Jan 8, 2024Updated 2 years ago
- um simples painel de consulta☆20Nov 15, 2021Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆25Aug 22, 2017Updated 8 years ago
- Rerousces related to time-travel debugging (TTD)☆33Jan 6, 2026Updated 2 months ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆34Sep 19, 2017Updated 8 years ago