Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆42Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel hooking library☆21May 23, 2020Updated 5 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆22Apr 7, 2018Updated 8 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆16May 17, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functi…☆10Jan 10, 2021Updated 5 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated last year
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- A way to backdoor every process☆66Oct 5, 2017Updated 8 years ago
- Android 脱壳☆13Mar 23, 2022Updated 4 years ago
- ☆18Dec 2, 2025Updated 5 months ago
- PoC of injecting code into a running Linux process☆22Sep 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆16Apr 30, 2020Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆41Sep 26, 2019Updated 6 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Foxit Image Converter Fuzzing Harness☆18Jun 11, 2020Updated 5 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Linux Kernel Hacking☆762Apr 10, 2024Updated 2 years ago
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- ☆14Aug 15, 2018Updated 7 years ago
- ☆10May 30, 2021Updated 4 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 10 years ago
- JP2KLib.dll harness for WinAFL☆43Apr 20, 2021Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Yes, it's a camel case.☆16Mar 1, 2020Updated 6 years ago
- A dumper for all the imports stored within a Windows PE (portable executable).☆15Mar 16, 2022Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago