vimpostor / copycatLinks
A library for intercepting system calls
☆103Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- eBPF Memory Dump Tool☆98Updated 5 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- io_uring based rootkit☆249Updated 9 months ago
- ☆89Updated 11 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- CTF Challenge for CSAW Finals 2021☆13Updated 4 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆97Updated 7 months ago
- Make your programs stealthier🐝☆201Updated 7 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- ☆137Updated last year
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated last month
- Simple syscall sandboxing for Linux☆144Updated 3 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆119Updated this week
- Automated vulnerability discovery and annotation☆68Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆87Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 8 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 6 months ago
- A simple Meterpreter stager written in Rust.☆45Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated 6 months ago
- Identify and extract files from container formats using unblob.☆26Updated last year
- ☆35Updated last year
- Security Blogs - A simple aggregator for security news/blog