chkyass / Freebsd-RootkitLinks
Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.
☆19Updated 5 years ago
Alternatives and similar repositories for Freebsd-Rootkit
Users that are interested in Freebsd-Rootkit are comparing it to the libraries listed below
Sorting:
- Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 6 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- ACTIVELabs Security Advisories☆23Updated 4 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Slide deck for DefCon Beijing☆39Updated 7 years ago
- EoP POC for CVE-2019-1132☆61Updated 6 years ago
- ☆34Updated 9 years ago
- ☆54Updated 7 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- Security Research☆36Updated 3 years ago
- cve-2019-0808-poc☆48Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- a open source rat from china☆26Updated 9 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- POC for CVE-2018-0824☆87Updated 3 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆26Updated 7 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- Shellcode Of Death☆42Updated 12 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Updated 5 years ago