MatheuZSecurity / detect-lkm-rootkit-cheatsheet
Cheat sheet to detect and remove linux kernel rootkit
☆21Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for detect-lkm-rootkit-cheatsheet
- Lena's scripts/code/resources for malware analysis☆25Updated 4 months ago
- ☆20Updated this week
- Make an Linux Kernel rootkit visible again.☆42Updated last month
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- ☆58Updated 7 months ago
- ☆37Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆81Updated 7 months ago
- Malware Analysis tools☆25Updated last month
- ☆20Updated 11 months ago
- ☆49Updated last year
- ☆50Updated 6 months ago
- Docker container for running CobaltStrike 4.10☆32Updated last month
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆48Updated last month
- Work, timer, and wait callback example using solely Native Windows APIs.☆83Updated 9 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆66Updated 7 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆30Updated last week
- ☆68Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆58Updated 2 weeks ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 8 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆21Updated 3 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆33Updated last month
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- ☆35Updated 11 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 3 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆36Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆28Updated 5 months ago
- ☆27Updated 5 months ago
- ☆28Updated 5 months ago