vimpostor / copycatLinks
A library for intercepting system calls
☆103Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆98Updated 5 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- io_uring based rootkit☆249Updated 9 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- ☆137Updated last year
- ☆89Updated 11 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Make your programs stealthier🐝☆201Updated 7 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- In-Memory Rootkit For Linux and BSD☆87Updated 5 months ago
- ☆76Updated 6 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆119Updated this week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- Toolkit for creating cryptographic figures and videos.☆36Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated 6 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- ☆23Updated last year
- A simple Meterpreter stager written in Rust.☆45Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated last month
- ☆35Updated last year
- Security Blogs - A simple aggregator for security news/blog☆24Updated 2 weeks ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Updated 5 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 9 months ago