Iansus / hideproc-lkm
Linux 4.9 Loadable Kernel Module to hide processes from system utilities
☆67Updated 6 years ago
Alternatives and similar repositories for hideproc-lkm:
Users that are interested in hideproc-lkm are comparing it to the libraries listed below
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- Rootkit Detector for UNIX☆62Updated last year
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- ☆20Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆74Updated 6 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- My little precious collection of Linux 4.x kernel rootkits☆25Updated 6 months ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Repository containing many useful scripts☆74Updated 2 years ago
- The Alternative Fileless File System☆55Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago