carloslack / volundrLinks
Just another elf library
☆30Updated last year
Alternatives and similar repositories for volundr
Users that are interested in volundr are comparing it to the libraries listed below
Sorting:
- yet another hidden LKM hunter☆29Updated last month
- Attacking the cleanup_module function of a kernel module☆48Updated 3 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Linux Sleep Obfuscation☆106Updated last year
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Monarch - The Adversary Emulation Toolkit☆63Updated 9 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆20Updated 2 weeks ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆37Updated 2 years ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆58Updated 3 months ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & …☆27Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- using the gpu to hide your payload☆62Updated 3 years ago
- ☆37Updated 7 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆48Updated last month
- An In-memory Embedding of CPython☆30Updated 4 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 5 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆15Updated last year
- dlopen() filelessly a shared object or even a program (and run it).☆56Updated 2 years ago