Notselwyn / netkitLinks
Linux rootkit for educational purposes
☆34Updated last year
Alternatives and similar repositories for netkit
Users that are interested in netkit are comparing it to the libraries listed below
Sorting:
- yet another hidden LKM hunter☆29Updated 4 months ago
- ☆81Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- BINARLY Research Tools and PoCs☆39Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆63Updated 3 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- ☆85Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 8 months ago
- ☆38Updated last year
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Updated 4 months ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- Analysis of the vulnerability☆50Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- ☆133Updated 2 weeks ago
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- ☆130Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year