A library for intercepting system calls
β103Jan 5, 2025Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024β37Sep 30, 2024Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 7 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 8 months ago
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An OpenAI API Compatible Honeypot Gatewayβ22Mar 17, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.β26Apr 18, 2026Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 3 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β46Updated this week
- π Function-level tracing tool for Seccomp profiling, with eBPFβ176Feb 23, 2026Updated 2 months ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.β22Oct 10, 2024Updated last year
- Web File Managerβ11Aug 21, 2025Updated 9 months ago
- Proof-of-Concept to evade auditd by tampering via ptraceβ19Aug 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Locate dlls and function addresses without PEB Walk and EAT parsingβ105Nov 7, 2025Updated 6 months ago
- Userland exec PoC to be used as attack vector techniqueβ141Apr 11, 2026Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.β44May 8, 2026Updated last week
- Minimal ELF inspector written in C for quick binary layout inspectionβ29Jan 9, 2026Updated 4 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.β122May 8, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- β44Jul 17, 2025Updated 10 months ago
- Reaping treasures from strings in remote processes memoryβ287Feb 8, 2025Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variableβ30Jul 11, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rules shared by the community from 100 Days of YARA 2025β38Jan 2, 2026Updated 4 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- β24May 12, 2026Updated last week
- β87Mar 30, 2026Updated last month
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIsβ109Sep 4, 2025Updated 8 months ago
- β18Feb 2, 2026Updated 3 months ago
- Small and lightweight x86-64 VBR bootkit for research purposesβ10Dec 7, 2022Updated 3 years ago
- io_uring based rootkitβ251Apr 24, 2025Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.β65Oct 17, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- eBPF Memory Dump Toolβ105May 7, 2026Updated last week
- β156Apr 23, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ100Apr 2, 2025Updated last year
- β22Sep 10, 2024Updated last year
- AYY LMAOβ22Mar 26, 2016Updated 10 years ago
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 10 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ47Aug 5, 2025Updated 9 months ago