Make an Linux Kernel rootkit visible again.
☆59Feb 27, 2025Updated last year
Alternatives and similar repositories for Imperius
Users that are interested in Imperius are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Dec 16, 2024Updated last year
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- Collection of codes focused on Linux rootkits☆203Oct 22, 2025Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- 「🔑」Discord Brute Force Token☆10Mar 15, 2021Updated 5 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Koth - TryHackMe Tricks☆189Nov 5, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆443Jan 5, 2025Updated last year
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- CDN cache busting static file URL modifier for Django☆15Oct 16, 2022Updated 3 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆60Mar 12, 2025Updated last year
- 「💀」Proof of concept on BYOVD attack☆166Dec 7, 2024Updated last year