wunderwuzzi23 / Offensive-BPFLinks
Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.
☆20Updated 3 years ago
Alternatives and similar repositories for Offensive-BPF
Users that are interested in Offensive-BPF are comparing it to the libraries listed below
Sorting:
- Active Directory Password Spray Testing Utility in Go☆17Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆73Updated 2 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 9 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 3 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆19Updated last year
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- Linux startup analyzer☆66Updated 7 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Updated 2 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- ☆19Updated 2 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 4 years ago
- ☆17Updated 2 years ago
- ☆53Updated 2 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- ☆23Updated 3 years ago
- ☆43Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 5 months ago