MatthiasCr / LKM-RootkitLinks
Malware to gain persistence on a victims machine.
☆20Updated 2 years ago
Alternatives and similar repositories for LKM-Rootkit
Users that are interested in LKM-Rootkit are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 5 months ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- ☆214Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- Red-Team Linux kernel rootkit☆603Updated 3 weeks ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆259Updated 2 years ago
- nysm is a stealth post-exploitation container.☆265Updated 5 months ago
- eBPF hacks☆187Updated 11 months ago
- ☆278Updated 3 years ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- A (small) web exploit framework☆97Updated 2 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆166Updated 2 years ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆391Updated 2 months ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago
- Decrypt encrypted Fortienet FortiOS firmware images☆140Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 9 months ago
- ☆233Updated last year
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆143Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆277Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆207Updated last week
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆121Updated last year
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- LD_PRELOAD rootkit☆138Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Collection of codes focused on Linux rootkits☆186Updated last month
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago