vimpostor / copycatLinks
A library for intercepting system calls
☆103Updated 11 months ago
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆96Updated 4 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 2 months ago
- io_uring based rootkit☆244Updated 8 months ago
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆13Updated 4 months ago
- Make your programs stealthier🐝☆195Updated 6 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 7 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 9 months ago
- ☆136Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆100Updated 3 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆109Updated last week
- Rust Linux Kernel Module designed for LKM rootkit detection☆56Updated 9 months ago
- ☆75Updated 5 months ago
- A simple Meterpreter stager written in Rust.☆43Updated last month
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- WallEscape vulnerability in util-linux☆52Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 6 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 5 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆92Updated 3 months ago
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- ☆24Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆75Updated 2 weeks ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 7 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆95Updated 6 months ago
- This is practice VM for malware development☆170Updated last month
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- ☆35Updated 10 months ago