vimpostor / copycatLinks
A library for intercepting system calls
☆103Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆97Updated 4 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 2 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- io_uring based rootkit☆246Updated 8 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- ☆89Updated 11 months ago
- Make your programs stealthier🐝☆198Updated 7 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆96Updated 7 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆137Updated last year
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆93Updated 3 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Simple syscall sandboxing for Linux☆144Updated 3 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆50Updated last month
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆113Updated last week
- In-Memory Rootkit For Linux and BSD☆86Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- ☆76Updated 6 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73Updated 8 months ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated 5 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆76Updated 5 months ago
- This is practice VM for malware development☆175Updated 2 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆133Updated 8 months ago
- Anti-analysis tool that obfuscates ELF files☆36Updated 4 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 4 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- Toolkit for creating cryptographic figures and videos.☆36Updated last year
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year