vimpostor / copycatLinks
A library for intercepting system calls
☆96Updated 5 months ago
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆73Updated last week
- Open Source eBPF Malware Analysis Framework☆48Updated 8 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago
- io_uring based rootkit☆206Updated last month
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆118Updated this week
- ☆89Updated 4 months ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆106Updated 4 months ago
- ☆73Updated this week
- Rust Linux Kernel Module designed for LKM rootkit detection☆48Updated 3 months ago
- Damn Vulnerable UEFI☆283Updated 9 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆120Updated last month
- ☆88Updated 11 months ago
- Rebuild of portspoof in GO with additional features.☆18Updated this week
- An eBPF🐝 Keylogger with C2-based RCE payload delivery☆279Updated last month
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆54Updated 3 months ago
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 3 months ago
- In-Memory Rootkit For Linux☆70Updated 2 weeks ago
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated 5 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 9 months ago
- Simple syscall sandboxing for Linux☆135Updated last month
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 11 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆70Updated last month
- Web Server Vulnerability Scanning Tool☆36Updated 3 months ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 2 months ago
- Monarch - The Adversary Emulation Toolkit☆62Updated 5 months ago
- Protection against HTML smuggling attacks.☆96Updated 2 weeks ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- ☆77Updated last year
- ☆28Updated 4 months ago