SourceCodeDeleted / rootkitdev-linuxLinks
Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆44Updated 3 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
Sorting:
- ☆90Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- ☆48Updated 5 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆132Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- ☆139Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- ☆37Updated 6 months ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- ☆21Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Random CVEs☆33Updated 4 months ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- ☆136Updated 6 months ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago