SanderDemeester / evil_sysreadLinks
Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.
☆15Updated 3 years ago
Alternatives and similar repositories for evil_sysread
Users that are interested in evil_sysread are comparing it to the libraries listed below
Sorting:
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- Shellcode tracer☆15Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 5 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 9 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Updated 13 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 12 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 12 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Rootkit☆23Updated 11 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- lkm rootkit☆15Updated 11 years ago