SourceCodeDeleted / rootkitdev-linuxLinks
Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆44Updated 3 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
Sorting:
- ☆90Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆131Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 3 years ago
- ☆48Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆233Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- ☆37Updated 9 months ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Random CVEs☆34Updated 7 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ☆13Updated 4 years ago
- ☆21Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆14Updated 4 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- ☆80Updated 9 months ago