Go shellcode loader that combines multiple evasion techniques
-
Updated
Jun 21, 2023 - Go
Go shellcode loader that combines multiple evasion techniques
Deep kubernetes visibility from the kubectl
OCI hook to trace syscalls and generate a seccomp profile
⚗️ Intercept stdin/stdout/stderr for any process
A suite of tools for disassembly, ROP, and binary analysis written in Go
Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.
strace-perfetto runs strace and converts the raw output to a Trace Event JSON file. The JSON file can then be analyzed using Google's Perfetto UI
Utility to set desktop wallpaper for Windows, [Mac & Linux WIP!]
fun way to proxy syscalls or regular function calls through vulkan-1.dll
一个基于go写的shellcode_load. Advanced modular evasion loader for Windows x64. Features Build Tag-based isolation, Indirect Syscalls, Telemetry Blinding (ETW/AMSI), and robust Call Stack Spoofing to thwart EDR stack analysis.
Add a description, image, and links to the syscalls topic page so that developers can more easily learn about it.
To associate your repository with the syscalls topic, visit your repo's landing page and select "manage topics."