SourceCodeDeleted / rootkitdev-linux
Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆44Updated 3 years ago
Alternatives and similar repositories for rootkitdev-linux:
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
- ☆90Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆69Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆36Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆83Updated last year
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Random CVEs☆30Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- Winsock accept() Backdoor Implant.☆112Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 7 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 3 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆71Updated last year
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- ☆48Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆97Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago