RITRedteam / goofkit
In line function hooking LKM rootkit
☆51Updated 4 years ago
Alternatives and similar repositories for goofkit:
Users that are interested in goofkit are comparing it to the libraries listed below
- ☆48Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- ☆23Updated 4 years ago
- Proxy system calls over an RPC channel☆97Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆69Updated 3 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆73Updated 3 years ago
- ☆45Updated 2 years ago
- ☆158Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆111Updated 3 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 2 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆145Updated 2 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆93Updated 5 years ago
- ☆90Updated 4 years ago
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- Simple 32/64-bit PEs loader.☆136Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- ☆45Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆34Updated 3 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆27Updated 4 years ago