Make an Linux Kernel rootkit visible again.
☆59Feb 27, 2025Updated last year
Alternatives and similar repositories for Imperius
Users that are interested in Imperius are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- yet another hidden LKM hunter☆32Sep 18, 2025Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Dec 16, 2024Updated last year
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- Collection of codes focused on Linux rootkits☆198Oct 22, 2025Updated 4 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆61Dec 7, 2024Updated last year
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 10 months ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 8 months ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆60Mar 12, 2025Updated 11 months ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆437Jan 5, 2025Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- Koth - TryHackMe Tricks☆189Nov 5, 2023Updated 2 years ago
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated last year
- The best powershell obfuscator ever made☆124Aug 1, 2025Updated 7 months ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Test data for x86 instructions☆13Apr 13, 2021Updated 4 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- A Repository to Track Anti-Forensic Techniques☆118Mar 8, 2023Updated 2 years ago