Iansus / hideproc-lkm
Linux 4.9 Loadable Kernel Module to hide processes from system utilities
☆67Updated 6 years ago
Alternatives and similar repositories for hideproc-lkm
Users that are interested in hideproc-lkm are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 7 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 11 years ago
- Inject shellcode into running processes in Linux.☆43Updated 10 months ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Execute system calls over the network☆11Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆33Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 9 months ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- ELF binary infector☆32Updated 13 years ago
- Backdoor with Golang (Cross-Plateform)☆17Updated 3 years ago
- A shellcode testing harness.☆69Updated 10 months ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago