XShar / rootkit_for_linux_kernel_5Links
Пример руткита для ядра линукс 5
☆19Updated 4 years ago
Alternatives and similar repositories for rootkit_for_linux_kernel_5
Users that are interested in rootkit_for_linux_kernel_5 are comparing it to the libraries listed below
Sorting:
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 8 months ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- ☆33Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Bootkits☆18Updated last year
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆38Updated 10 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- PPT of my talks.☆11Updated this week
- ☆50Updated 8 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- Zerokit shared code☆16Updated 6 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Practical Reverse Engineering book exercises☆9Updated 4 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆36Updated 4 years ago