sample linux x86_64 ELF virus
☆54Jun 25, 2018Updated 7 years ago
Alternatives and similar repositories for PIvirus
Users that are interested in PIvirus are comparing it to the libraries listed below
Sorting:
- Devestating and awesome Linux X86_64 ELF Virus☆237Sep 9, 2022Updated 3 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- STAN is a sTAtic aNalyser☆38Jul 26, 2017Updated 8 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 7 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Mar 21, 2015Updated 10 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- CVE-2017-12149 JBOSS RCE (TESTED)☆15Dec 23, 2017Updated 8 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago