A library for intercepting system calls
β103Jan 5, 2025Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024β36Sep 30, 2024Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 7 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Unauthenticated enumeration of AWS IAM Roles.β26Sep 7, 2025Updated 7 months ago
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β43Mar 31, 2026Updated last week
- π Function-level tracing tool for Seccomp profiling, with eBPFβ176Feb 23, 2026Updated last month
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.β22Oct 10, 2024Updated last year
- Userland exec PoC to be used as attack vector techniqueβ97Oct 23, 2025Updated 5 months ago
- Web File Managerβ11Aug 21, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof-of-Concept to evade auditd by tampering via ptraceβ19Aug 3, 2023Updated 2 years ago
- Minimal ELF inspector written in C for quick binary layout inspectionβ29Jan 9, 2026Updated 3 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsingβ105Nov 7, 2025Updated 5 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Apr 3, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- β44Jul 17, 2025Updated 8 months ago
- Reaping treasures from strings in remote processes memoryβ285Feb 8, 2025Updated last year
- β87Mar 30, 2026Updated last week
- β19Mar 7, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Rules shared by the community from 100 Days of YARA 2025β38Jan 2, 2026Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated 11 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIsβ107Sep 4, 2025Updated 7 months ago
- Small and lightweight x86-64 VBR bootkit for research purposesβ10Dec 7, 2022Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.β65Oct 17, 2023Updated 2 years ago
- io_uring based rootkitβ250Apr 24, 2025Updated 11 months ago
- A revival of the classic and legendary KsDumperβ41Nov 19, 2025Updated 4 months ago
- eBPF Memory Dump Toolβ103Updated this week
- Linux #rootkit and #malware revealerβ31Aug 1, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ99Apr 2, 2025Updated last year
- β21Sep 10, 2024Updated last year
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 9 months ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler outputβ24Nov 24, 2025Updated 4 months ago
- Command and Control Framework using powershell implantsβ36Jun 17, 2025Updated 9 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.β371Aug 29, 2025Updated 7 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ46Aug 5, 2025Updated 8 months ago