NexusBots / Umbreon-RootkitLinks
☆65Updated 8 years ago
Alternatives and similar repositories for Umbreon-Rootkit
Users that are interested in Umbreon-Rootkit are comparing it to the libraries listed below
Sorting:
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆54Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- ☆31Updated 8 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- simple shellcode generator☆113Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- ☆33Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated last year
- A Linux backdoor with the goal of circumventing network firewalls.☆16Updated 13 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 10 months ago