vimpostor / copycatLinks
A library for intercepting system calls
☆101Updated 6 months ago
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆82Updated last month
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- io_uring based rootkit☆216Updated 3 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆127Updated 2 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆50Updated 4 months ago
- ☆134Updated last year
- Proof-of-concept modular implant platform leveraging v8☆53Updated 4 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆66Updated 3 months ago
- ☆57Updated 3 weeks ago
- Make your programs stealthier🐝☆173Updated last month
- A simple Meterpreter stager written in Rust.☆38Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 4 months ago
- ☆28Updated 6 months ago
- In-Memory Rootkit For Linux☆72Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆89Updated last month
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆22Updated 11 months ago
- ☆31Updated 5 months ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆12Updated this week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆81Updated last month
- An eBPF🐝 Keylogger with C2-based RCE payload delivery☆282Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 3 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆47Updated 6 months ago
- Code used in blog posts☆34Updated 2 months ago
- ☆88Updated 5 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆91Updated last week