MatheuZSecurity / Rootkit
Collection of codes focused on Linux rootkits
☆92Updated 3 weeks ago
Alternatives and similar repositories for Rootkit:
Users that are interested in Rootkit are comparing it to the libraries listed below
- Cheat sheet to detect and remove linux kernel rootkit☆52Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆160Updated 2 weeks ago
- Windows rootkit designed to work with BYOVD exploits☆170Updated 2 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆194Updated 3 months ago
- Stage 0☆154Updated 3 months ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆51Updated 6 months ago
- ☆64Updated last month
- Command and Control (C2) framework☆126Updated 11 months ago
- A Mythic Agent written in PIC C.☆184Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆129Updated 4 months ago
- Get root via TTY / TIOCSTI stuffing☆70Updated 8 months ago
- kernel callback removal (Bypassing EDR Detections)☆130Updated this week
- Tools for analyzing EDR agents☆221Updated 9 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated last month
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- POC of GITHUB simple C2 in rust☆54Updated last month
- ☆47Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆71Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆140Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆159Updated 3 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆116Updated 2 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 5 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆90Updated last month
- Sleep obfuscation☆210Updated 3 months ago