Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆42Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Graphical Debugging Shell for ReactOS Kernel Debugger (KDBG)☆36Feb 25, 2023Updated 3 years ago
- Linux kernel hooking library☆21May 23, 2020Updated 5 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆21Apr 7, 2018Updated 8 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆16May 17, 2018Updated 7 years ago
- TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functi…☆10Jan 10, 2021Updated 5 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Jun 21, 2016Updated 9 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated last year
- ☆18Dec 2, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆45Sep 26, 2019Updated 6 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 6 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Linux Kernel Hacking☆757Apr 10, 2024Updated 2 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- IDA plugin aid to set android so breakpoint☆34Dec 9, 2017Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Dec 25, 2017Updated 8 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 6 months ago
- Yes, it's a camel case.☆16Mar 1, 2020Updated 6 years ago
- A dumper for all the imports stored within a Windows PE (portable executable).☆14Mar 16, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago