iknowthis Linux SystemCall Fuzzer
☆20Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for iknowthis
Users that are interested in iknowthis are comparing it to the libraries listed below
Sorting:
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- ☆13Feb 8, 2019Updated 7 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- The Xmidt server for delivering events written in Go.☆16Updated this week
- Highly scalable pipes for communicating with devices all over the place.☆19Aug 20, 2025Updated 6 months ago
- ☆16May 22, 2014Updated 11 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Put an end to curl | bash with this one weird trick☆17Oct 24, 2015Updated 10 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Windows Data Protection API (DPAPI) command line tool☆21Feb 23, 2019Updated 7 years ago
- A tool to generate malicious .deb files☆18Mar 6, 2018Updated 8 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- QuasarRAT analysis tools and research report☆29Dec 22, 2023Updated 2 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- An NTFS file parser in Go☆72Mar 22, 2025Updated 11 months ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Mac OS X rootkit - for learning purposes☆129May 19, 2014Updated 11 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- Generate network maps from packet captures☆30Sep 15, 2019Updated 6 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Oct 1, 2017Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆34Jul 16, 2020Updated 5 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago