Iansus / hideproc-lkm
Linux 4.9 Loadable Kernel Module to hide processes from system utilities
☆67Updated 6 years ago
Alternatives and similar repositories for hideproc-lkm:
Users that are interested in hideproc-lkm are comparing it to the libraries listed below
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- ☆20Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 8 months ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 6 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Inject shellcode into running processes in Linux.☆43Updated 9 months ago