Linux #rootkit and #malware revealer
☆31Aug 1, 2024Updated last year
Alternatives and similar repositories for sunlight
Users that are interested in sunlight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 6 months ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated 2 months ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- A command line Curses based json viewer and tabulator☆30Aug 3, 2025Updated 8 months ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Production-ready detection & response queries for osquery☆603Aug 13, 2025Updated 7 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- ☆149Mar 31, 2026Updated last week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,288Mar 28, 2026Updated 2 weeks ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆49Jan 26, 2026Updated 2 months ago
- ☆23Jan 15, 2019Updated 7 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆104Updated this week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆69Apr 29, 2024Updated last year
- ESF modular ingestion tool for development and research.☆38Dec 21, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago
- A tool to start programs with admin rights.☆15Nov 18, 2025Updated 4 months ago
- ☆28Sep 4, 2024Updated last year
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 8 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆97Nov 9, 2024Updated last year
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- Base class for Jupyter Data Integrations☆11Feb 11, 2026Updated 2 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆23Nov 29, 2023Updated 2 years ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆209Dec 20, 2025Updated 3 months ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- ☆28Dec 29, 2025Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Mar 30, 2026Updated last week
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year