En14c / LilyOfTheValley
Simple LKM linux kernel rootkit (x86 / x86_64)
☆23Updated 4 years ago
Alternatives and similar repositories for LilyOfTheValley:
Users that are interested in LilyOfTheValley are comparing it to the libraries listed below
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- ☆33Updated 9 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- ☆23Updated 9 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Ruby ALPC Fuzzer ( joke )☆24Updated 10 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- a open source rat from china☆24Updated 8 years ago
- Green shellcode challenge tools☆22Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- ☆27Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- ☆21Updated 4 years ago
- Rootkit☆21Updated 10 years ago