Malware to gain persistence on a victims machine.
☆20Feb 12, 2023Updated 3 years ago
Alternatives and similar repositories for LKM-Rootkit
Users that are interested in LKM-Rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kiddy - (linux) kernel identity spoofer☆16Mar 18, 2024Updated 2 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- yet another hidden LKM hunter☆32Sep 18, 2025Updated 6 months ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆24May 19, 2025Updated 10 months ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- A statically typed version of pest.☆12Dec 2, 2025Updated 4 months ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- Simple music player for iOS using industry standard development practises☆10Jul 18, 2025Updated 8 months ago
- Manage user and group limits via Puppet☆17Oct 17, 2025Updated 5 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Dec 16, 2025Updated 3 months ago
- ☆10Feb 2, 2026Updated 2 months ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆266Dec 6, 2025Updated 4 months ago
- ☆14Oct 25, 2022Updated 3 years ago
- Tool for parsing hungarian laws (Rust version)☆12Aug 1, 2023Updated 2 years ago
- ☆11Jun 22, 2025Updated 9 months ago
- Fast Wasm interpreter in Rust☆16May 7, 2022Updated 3 years ago
- ☆10Jul 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆18Aug 29, 2022Updated 3 years ago
- 利用wasm静态免杀的demo☆15Apr 11, 2024Updated 2 years ago
- Terraform module that creates RBAC rules for Kubernetes☆15Sep 27, 2023Updated 2 years ago
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- ☆18Updated this week
- Automated macOS setup, with automated tests☆15Apr 5, 2026Updated last week
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A multi-purpose library for decrypting Profile.save and other data, as well as making valid requests to NK's server☆17Aug 29, 2022Updated 3 years ago
- Powerful infrastructure development tool based on Ansible☆15Updated this week
- Contains MicroServices which send and receive cat names.☆14Dec 27, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Apr 14, 2014Updated 12 years ago
- The Z3-Noodler String Solver☆25Updated this week
- ☆13Feb 27, 2024Updated 2 years ago