a7vinx / liinuxLinks
A linux rootkit works on kernel 4.0.X or higher
☆36Updated 8 years ago
Alternatives and similar repositories for liinux
Users that are interested in liinux are comparing it to the libraries listed below
Sorting:
- Rootkit☆21Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- ☆14Updated 9 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- A toy Linux rootkit.☆13Updated 12 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- ☆28Updated 8 years ago
- OpenType font file format fuzzer for Windows☆52Updated 11 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Anti-AV compilation☆43Updated 11 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago