Lists (28)
Sort Name ascending (A-Z)
AI Workflow Automation
Android
APIs
Awesome Lists
Badges
BugBounty
ChatGPT
Cheatsheets
Cloud
Firefox Hardening
Hardening
I2P
✨ Inspiration
IoCs
IPFS Filesystem
Linux Malware research
Linux shell scripts
Malware Analysis
MCP
OSINT
Pentesting
Ransomware Research
Search Engines
SOC Analyst
SQL
Telegram
Threat Intelligence
Web Hacking
Starred repositories
MimiClaw: Run OpenClaw on a $5 chip. No OS(Linux). No Node.js. No Mac mini. No Raspberry Pi. No VPS. Hardware agents OS.
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
The papers and books I've read or am about to read.
dtrace for linux - kernel driver and userland tools
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools
Devestating and awesome Linux X86_64 ELF Virus
Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.
ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)
ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD
An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses
Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)
Simple ELF tools written to demonstrate libelfmaster capabilities.
Be able to execute memory snapshots so they can start running where they left off.
relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.
Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster
ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables
ELF binary virus capable of infecting position independent executables and libraries.