SourceCodeDeleted / rootkitdev-linuxLinks
Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆44Updated 3 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
Sorting:
- ☆91Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆85Updated 8 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Updated 2 years ago
- ☆48Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆53Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ☆37Updated 11 months ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 4 years ago
- ☆59Updated 4 years ago
- ☆21Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago