A library for intercepting system calls
β103Jan 5, 2025Updated last year
Alternatives and similar repositories for copycat
Users that are interested in copycat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024β36Sep 30, 2024Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 8 months ago
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.β26Apr 18, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β44Apr 23, 2026Updated last week
- π Function-level tracing tool for Seccomp profiling, with eBPFβ176Feb 23, 2026Updated 2 months ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.β22Oct 10, 2024Updated last year
- AgentRE-Bench is an agentic benchmark that evaluates state-of-the-art models on long-horizon reverse engineering tasks, measuring their aβ¦β52Updated this week
- Minimal ELF inspector written in C for quick binary layout inspectionβ29Jan 9, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Locate dlls and function addresses without PEB Walk and EAT parsingβ105Nov 7, 2025Updated 5 months ago
- Userland exec PoC to be used as attack vector techniqueβ137Apr 11, 2026Updated 2 weeks ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.β117Mar 14, 2026Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Jan 2, 2025Updated last year
- β44Jul 17, 2025Updated 9 months ago
- Reaping treasures from strings in remote processes memoryβ286Feb 8, 2025Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variableβ30Jul 11, 2025Updated 9 months ago
- Rules shared by the community from 100 Days of YARA 2025β38Jan 2, 2026Updated 3 months ago
- β19Mar 7, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- β87Mar 30, 2026Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIsβ109Sep 4, 2025Updated 7 months ago
- β18Feb 2, 2026Updated 2 months ago
- Small and lightweight x86-64 VBR bootkit for research purposesβ10Dec 7, 2022Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.β65Oct 17, 2023Updated 2 years ago
- io_uring based rootkitβ249Apr 24, 2025Updated last year
- eBPF Memory Dump Toolβ104Apr 13, 2026Updated 2 weeks ago
- β156Apr 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux #rootkit and #malware revealerβ31Aug 1, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ100Apr 2, 2025Updated last year
- β22Sep 10, 2024Updated last year
- PoC to tunnel via AWS Short-Message-Queuesβ24Jun 21, 2025Updated 10 months ago
- Command and Control Framework using powershell implantsβ36Jun 17, 2025Updated 10 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ47Aug 5, 2025Updated 8 months ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobesβ12Sep 30, 2020Updated 5 years ago