cenobyte-vincit / encrypted-linux-kernel-modules
encrypted-linux-kernel-modules
☆12Updated 4 years ago
Alternatives and similar repositories for encrypted-linux-kernel-modules:
Users that are interested in encrypted-linux-kernel-modules are comparing it to the libraries listed below
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆27Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆12Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Regular expression Search on the command-line☆15Updated 10 months ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆16Updated 8 years ago