MatheuZSecurity / detect-lkm-rootkit-cheatsheetLinks
Cheat sheet to detect and remove linux kernel rootkit
☆68Updated 7 months ago
Alternatives and similar repositories for detect-lkm-rootkit-cheatsheet
Users that are interested in detect-lkm-rootkit-cheatsheet are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆141Updated last month
- Make an Linux Kernel rootkit visible again.☆54Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- ☆67Updated 6 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- Analyse MSI files for vulnerabilities☆137Updated 11 months ago
- ☆37Updated last year
- A Repository to Track Anti-Forensic Techniques☆110Updated 2 years ago
- Python tool to check rootkits in Windows kernel☆198Updated 5 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆66Updated 3 months ago
- ☆37Updated 7 months ago
- Powershell Linter☆68Updated this week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆62Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆89Updated 11 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 5 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆44Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆129Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆186Updated 4 months ago
- In-Memory Rootkit For Linux☆72Updated this week
- Malware Analysis tools☆26Updated 10 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆63Updated 10 months ago
- ☆67Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- ☆81Updated 8 months ago
- ☆105Updated last year
- Tools for analyzing EDR agents☆238Updated last year