Iansus / hideproc-lkm
Linux 4.9 Loadable Kernel Module to hide processes from system utilities
☆67Updated 6 years ago
Alternatives and similar repositories for hideproc-lkm:
Users that are interested in hideproc-lkm are comparing it to the libraries listed below
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ELF binary infector☆32Updated 13 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- PLASMA PULSAR☆69Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- ☆51Updated 8 years ago
- A way to backdoor every process☆65Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- ☆20Updated 7 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago