GunshipPenguin / kiteshieldLinks
Packer/Protector for x86-64 ELF binaries on Linux
☆172Updated 4 years ago
Alternatives and similar repositories for kiteshield
Users that are interested in kiteshield are comparing it to the libraries listed below
Sorting:
- An ELF / PE binary packer written in pure C, made for fun☆98Updated last year
- x86 malware emulator☆233Updated 2 weeks ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Updated 5 years ago
- A simple ptrace-less shared library injector for x64 Linux☆270Updated 2 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆111Updated last year
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆124Updated 2 months ago
- ☆74Updated 10 months ago
- Files for the packer tutorial☆73Updated 4 years ago
- A utility to fix intentionally corrupted UPX packed files.☆91Updated 2 years ago
- Reverse engineered source code of the autochk rootkit☆207Updated 5 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆285Updated 3 years ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆129Updated 3 weeks ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- A command line Windows API tracing tool for Golang binaries.☆157Updated last year
- ☆147Updated 2 years ago
- Kernel Exploits☆260Updated 4 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆86Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- PoC capable of detecting manual syscalls from usermode.☆202Updated 10 months ago
- Python library to convert elf to os-independent shellcodes☆61Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆237Updated 3 years ago
- Tiny loaders for various binary formats.☆241Updated 9 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆183Updated 5 months ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆154Updated 3 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago