MatheuZSecurity / detect-lkm-rootkit-cheatsheetLinks
Cheat sheet to detect and remove linux kernel rootkit
☆68Updated 8 months ago
Alternatives and similar repositories for detect-lkm-rootkit-cheatsheet
Users that are interested in detect-lkm-rootkit-cheatsheet are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆148Updated last week
- ☆67Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 6 months ago
- Make an Linux Kernel rootkit visible again.☆55Updated 5 months ago
- Analyse MSI files for vulnerabilities☆138Updated 11 months ago
- ☆105Updated last year
- ☆37Updated 8 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆66Updated 3 months ago
- Tools for analyzing EDR agents☆241Updated last year
- ☆37Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆82Updated this week
- ☆28Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated 11 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆92Updated 2 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆123Updated 11 months ago
- The different ways to dump lsass☆38Updated last week
- ☆113Updated last month
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Powershell Linter☆80Updated 3 weeks ago
- Backdooring VSCode Projects☆79Updated 2 months ago
- Python tool to check rootkits in Windows kernel☆198Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- ☆136Updated 2 years ago
- Persist like a Dodder☆63Updated 3 months ago