SourceCodeDeleted / rootkitdev-linuxLinks
Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆44Updated 3 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
Sorting:
- ☆90Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆21Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Let's try to create a rootkit!☆20Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- ☆48Updated 5 years ago
- Random CVEs☆33Updated 4 months ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆55Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆13Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆226Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆14Updated 4 years ago
- Matryoshka - stacked LKM loader☆53Updated last year
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- ☆18Updated 5 years ago