cenobyte-vincit / encrypted-linux-kernel-modulesLinks
encrypted-linux-kernel-modules
☆12Updated 5 years ago
Alternatives and similar repositories for encrypted-linux-kernel-modules
Users that are interested in encrypted-linux-kernel-modules are comparing it to the libraries listed below
Sorting:
- Main repository to pull all Cisco related projects.☆16Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- unbox - Unpack and Decompile the $h*! out of things☆47Updated 7 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- PCILeech HP iLO4 Service☆24Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- ☆65Updated 9 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- ☆28Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 6 years ago
- bunch of random stuff☆21Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Updated 5 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Skeleton project for your own GRUB-based bootkit☆17Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Updated 4 years ago
- Gandcrab v5.2 decryption scripts☆16Updated 6 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago