ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.
☆86Feb 28, 2025Updated last year
Alternatives and similar repositories for ModTracer
Users that are interested in ModTracer are comparing it to the libraries listed below
Sorting:
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- yet another hidden LKM hunter☆32Sep 18, 2025Updated 6 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- ☆29Sep 4, 2024Updated last year
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆443Jan 5, 2025Updated last year
- Collection of codes focused on Linux rootkits☆203Oct 22, 2025Updated 4 months ago
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- 「💀」Proof of concept on BYOVD attack☆166Dec 7, 2024Updated last year
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Windows rootkit designed to work with BYOVD exploits☆217Jan 18, 2025Updated last year
- Koth - TryHackMe Tricks☆189Nov 5, 2023Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 7 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- ☆168Feb 29, 2024Updated 2 years ago
- Red-Team LKM☆636Dec 16, 2025Updated 3 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆338Feb 27, 2026Updated 3 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Dec 16, 2024Updated last year
- Linux Shared Library to Shellcode Loader☆88Feb 15, 2026Updated last month
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago