a7vinx / liinux
A linux rootkit works on kernel 4.0.X or higher
☆36Updated 8 years ago
Alternatives and similar repositories for liinux:
Users that are interested in liinux are comparing it to the libraries listed below
- Rootkit☆21Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- ☆14Updated 9 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆28Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- A toy Linux rootkit.☆13Updated 11 years ago
- CVE-2014-0816☆25Updated 8 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- ☆33Updated 9 years ago
- ☆26Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Linux rootkit experimentations☆18Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- ☆42Updated 6 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago