a7vinx / liinux
A linux rootkit works on kernel 4.0.X or higher
☆36Updated 8 years ago
Alternatives and similar repositories for liinux:
Users that are interested in liinux are comparing it to the libraries listed below
- Rootkit☆21Updated 10 years ago
- ☆14Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- ☆33Updated 9 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- ☆28Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 8 years ago
- OpenType font file format fuzzer for Windows☆52Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- public bugs/proof of concepts☆47Updated 3 years ago
- Linux rootkit experimentations☆18Updated 9 years ago
- ☆26Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- An experimental rootkit for Android☆26Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 7 years ago