Zhang1933 / linux-rootkitLinks
Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.
☆21Updated 3 years ago
Alternatives and similar repositories for linux-rootkit
Users that are interested in linux-rootkit are comparing it to the libraries listed below
Sorting:
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆14Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated 11 months ago
- Reverse shell macro using Word VBA☆15Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- An evil bit backdoor for iptables☆53Updated 4 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- Source files for my posts☆17Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆79Updated 4 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆12Updated 2 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Updated 5 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆38Updated last month
- PoC-Malware-TTPs☆49Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago