MatthiasCr / LKM-RootkitLinks
Malware to gain persistence on a victims machine.
☆19Updated 2 years ago
Alternatives and similar repositories for LKM-Rootkit
Users that are interested in LKM-Rootkit are comparing it to the libraries listed below
Sorting:
- CVE-2023-4911 proof of concept☆168Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- ☆277Updated 2 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago
- ☆215Updated last year
- Red-Team Linux kernel rootkit☆518Updated this week
- Decrypt encrypted Fortienet FortiOS firmware images☆129Updated last year
- MikroTik remote jailbreak for v6.x.x☆136Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- nysm is a stealth post-exploitation container.☆253Updated last month
- ☆204Updated 8 months ago
- ☆244Updated 2 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆163Updated last year
- eBPF hacks☆188Updated 7 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆257Updated last year
- LD_PRELOAD rootkit☆133Updated last year
- CVE-2022-0185☆371Updated 3 years ago
- Bootkit sample for firmware attack☆257Updated 7 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- ☆304Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆162Updated 10 months ago
- Localroot-ALL-CVE~☆145Updated last year
- A (small) web exploit framework☆92Updated 3 weeks ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- ☆171Updated 2 years ago