R3tr074 / brokepkg
The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x
☆128Updated last year
Alternatives and similar repositories for brokepkg:
Users that are interested in brokepkg are comparing it to the libraries listed below
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- GhostWriting Injection Technique.☆168Updated 7 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆73Updated 2 years ago
- bdvl☆113Updated 3 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆467Updated 3 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆43Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆105Updated 4 years ago
- ☆195Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- LD_PRELOAD rootkit☆131Updated last year
- Code injection from Linux kernel to a process☆19Updated last year
- Simple shellcode obfuscator using PYTHON and C / C++☆74Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆123Updated 4 years ago
- BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen☆43Updated 2 years ago
- Kernel Exploits☆250Updated 3 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- Windows LPE exploit for CVE-2022-37969☆133Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆157Updated 4 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆59Updated 3 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 2 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- ☆162Updated 3 years ago
- A small PoC that creates processes in Windows☆176Updated 9 months ago
- Assembly block for hooking windows API functions.☆87Updated 5 years ago
- From directory deletion to SYSTEM shell☆110Updated 4 years ago