Malware to gain persistence on a victims machine.
☆20Feb 12, 2023Updated 3 years ago
Alternatives and similar repositories for LKM-Rootkit
Users that are interested in LKM-Rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated 2 years ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year
- Learning FreeBSD Kernel Hacking - Exercises☆63Jun 2, 2020Updated 5 years ago
- Alpine Linux based phpBB3 docker image☆15Jun 17, 2024Updated last year
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- A statically typed version of pest.☆12Dec 2, 2025Updated 3 months ago
- ☆20May 1, 2024Updated last year
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- Simple music player for iOS using industry standard development practises☆10Jul 18, 2025Updated 8 months ago
- Manage user and group limits via Puppet☆17Oct 17, 2025Updated 5 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Dec 16, 2025Updated 3 months ago
- ☆10Feb 2, 2026Updated last month
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- Talk to a USB serial device without OS drivers!☆11Sep 7, 2022Updated 3 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- Tool for parsing hungarian laws (Rust version)☆12Aug 1, 2023Updated 2 years ago
- ☆11Jun 22, 2025Updated 9 months ago
- Ansible collection for roles and plugins☆15Mar 9, 2026Updated 2 weeks ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- wassail (WebAssembly static analyzer and inspection library) is a toolkit to perform both lightweight and heavyweight static analysis of …☆61Aug 13, 2025Updated 7 months ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- A fuzzer for the CAN bus☆18Mar 1, 2025Updated last year
- 利用wasm静态免杀的demo☆15Apr 11, 2024Updated last year
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- ☆18Updated this week
- Automated macOS setup, with automated tests☆15Mar 16, 2026Updated last week
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- A multi-purpose library for decrypting Profile.save and other data, as well as making valid requests to NK's server☆17Aug 29, 2022Updated 3 years ago
- Powerful infrastructure development tool based on Ansible☆15Updated this week