PLEXSolutions / readhookLinks
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆36Updated 6 years ago
Alternatives and similar repositories for readhook
Users that are interested in readhook are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ☆65Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆44Updated 8 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆58Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- ELF DSO injector☆67Updated 3 months ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- ELF Infector's Toolkit☆64Updated 9 years ago
- ☆32Updated last year
- A novel technique to hide code from debuggers & disassemblers☆157Updated last year
- ELF/PE/Mach-O parsing library☆51Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- ☆43Updated 5 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 5 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆60Updated 10 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago