W3ndige / linux-process-injectionLinks
Proof of concept for injecting simple shellcode via ptrace into a running process.
☆71Updated 2 years ago
Alternatives and similar repositories for linux-process-injection
Users that are interested in linux-process-injection are comparing it to the libraries listed below
Sorting:
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆105Updated 9 months ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆73Updated 4 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆119Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- bdvl☆113Updated 3 years ago
- ☆50Updated 6 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆27Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- ☆18Updated 5 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆61Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆74Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated last month
- ☆48Updated 4 years ago
- ☆27Updated 5 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord …☆186Updated 3 years ago
- ☆62Updated 11 months ago
- ☆161Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆12Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆127Updated 3 years ago
- Batch script to compile a binary shellcode blob into an exe file☆85Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆228Updated 2 years ago
- yet another hidden LKM hunter☆23Updated last year