A library for intercepting system calls
☆103Jan 5, 2025Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 11 months ago
- ☆19Jul 21, 2025Updated 7 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Feb 7, 2026Updated 3 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 6 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- 🔍 Function-level tracing tool for Seccomp profiling, with eBPF☆177Feb 20, 2026Updated last week
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- ☆86Feb 4, 2026Updated 3 weeks ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- TLS 1.3 Handshake in Linux Kernel: 1. used by QUIC implementation on 'quic' branch; 2. used by NFS over TLS on 'sunrpc' branch; 3. us…☆12Dec 5, 2023Updated 2 years ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated last month
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated 3 weeks ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆368Aug 29, 2025Updated 6 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Aug 5, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year