MatheuZSecurity / Rootkit
Collection of codes focused on Linux rootkits
☆105Updated last month
Alternatives and similar repositories for Rootkit:
Users that are interested in Rootkit are comparing it to the libraries listed below
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 4 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆47Updated this week
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 7 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆68Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆182Updated 3 months ago
- Stage 0☆155Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆177Updated last month
- ☆104Updated 5 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- ☆66Updated 2 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 3 weeks ago
- Command and Control (C2) framework☆126Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆40Updated 3 weeks ago
- ☆36Updated 4 months ago
- Local & remote Windows DLL Proxying☆164Updated 10 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆75Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 7 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆161Updated 4 months ago
- A Mythic Agent written in PIC C.☆186Updated 2 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆103Updated 3 months ago
- Tools for analyzing EDR agents☆229Updated 10 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆131Updated 5 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆182Updated this week
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆211Updated 5 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆127Updated 2 weeks ago
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year