PinkP4nther / SutekhLinks
An example rootkit that gives a userland process root permissions
☆77Updated 5 years ago
Alternatives and similar repositories for Sutekh
Users that are interested in Sutekh are comparing it to the libraries listed below
Sorting:
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- public exploits☆35Updated 2 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- A curated list of rootkits found on Github and other sites.☆64Updated 8 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- ☆24Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- ☆33Updated 9 years ago
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 7 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago