En14c / LilyOfTheValley
Simple LKM linux kernel rootkit (x86 / x86_64)
☆21Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for LilyOfTheValley
- x86_64 linux rootkit using debug registers☆50Updated 2 years ago
- ☆31Updated 8 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆25Updated 4 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆35Updated 9 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆11Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆41Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 6 years ago
- ☆18Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 5 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Rootkit☆20Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated last year
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆13Updated 4 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆47Updated 4 years ago
- a open source rat from china☆24Updated 8 years ago