A library for intercepting system calls
☆103Jan 5, 2025Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆131Mar 26, 2025Updated 11 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Mar 12, 2026Updated last week
- 🔍 Function-level tracing tool for Seccomp profiling, with eBPF☆177Feb 23, 2026Updated 3 weeks ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 2 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- ☆43Jul 17, 2025Updated 8 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆86Feb 4, 2026Updated last month
- ☆19Mar 7, 2026Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- ☆18Feb 2, 2026Updated last month
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- io_uring based rootkit☆251Apr 24, 2025Updated 10 months ago
- A revival of the classic and legendary KsDumper☆41Nov 19, 2025Updated 4 months ago
- eBPF Memory Dump Tool☆101Feb 26, 2026Updated 3 weeks ago
- ☆156Apr 23, 2025Updated 10 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- ☆21Sep 10, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆370Aug 29, 2025Updated 6 months ago