LucaBongiorni / jellyfishLinks
GPU rootkit PoC by Team Jellyfish
☆100Updated 10 years ago
Alternatives and similar repositories for jellyfish
Users that are interested in jellyfish are comparing it to the libraries listed below
Sorting:
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆48Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 7 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- ☆163Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Updated 7 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- ☆109Updated 6 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- ☆34Updated 7 years ago
- Binary Golf Library☆61Updated 4 years ago
- Enumerate user mode shared memory mappings on Windows.☆126Updated 4 years ago
- This is a place to share my miscellaneous projects.☆116Updated 5 years ago
- ☆28Updated 6 years ago
- ☆90Updated 5 years ago
- Inject code into a legitimate process☆146Updated 11 years ago
- A utility to fix intentionally corrupted UPX packed files.☆93Updated 2 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- Exploits I've authored☆60Updated 6 years ago