Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+
☆42Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for rootkitdev-linux
Users that are interested in rootkitdev-linux are comparing it to the libraries listed below
Sorting:
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Graphical Debugging Shell for ReactOS Kernel Debugger (KDBG)☆36Feb 25, 2023Updated 3 years ago
- Linux kernel hooking library☆21May 23, 2020Updated 5 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- 处理器相关文集☆16Mar 12, 2026Updated last week
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functi…☆11Jan 10, 2021Updated 5 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated last year
- A way to backdoor every process☆68Oct 5, 2017Updated 8 years ago
- Android 脱壳☆14Mar 23, 2022Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- linux rootkit adapted for 2.6 and 3.x☆222Dec 30, 2015Updated 10 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- FileDisk和Filemon的MFC开源码☆11Mar 5, 2019Updated 7 years ago
- Linux Kernel Hacking☆750Apr 10, 2024Updated last year
- ☆14Aug 15, 2018Updated 7 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- ☆11May 30, 2021Updated 4 years ago
- 使用 frida stalker 实现的 trace☆30Dec 1, 2022Updated 3 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- IDA plugin aid to set android so breakpoint☆33Dec 9, 2017Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Dec 25, 2017Updated 8 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- A dumper for all the imports stored within a Windows PE (portable executable).☆15Mar 16, 2022Updated 4 years ago
- Yes, it's a camel case.☆16Mar 1, 2020Updated 6 years ago