LucaBongiorni / jellyfishLinks
GPU rootkit PoC by Team Jellyfish
☆98Updated 10 years ago
Alternatives and similar repositories for jellyfish
Users that are interested in jellyfish are comparing it to the libraries listed below
Sorting:
- ☆48Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- A git history of Windows filesystems☆76Updated 4 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Exploits I've authored☆60Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆135Updated 4 months ago
- ☆91Updated 4 years ago
- ☆34Updated 7 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Sample project for kernel debugging automation with Vagrant☆61Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 3 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- ☆106Updated 6 years ago
- ☆18Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆162Updated 3 years ago
- From directory deletion to SYSTEM shell☆112Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 11 months ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Set of antianalysis techniques found in malware☆132Updated last year