chokepoint / CryptHookLinks
TCP/UDP symmetric encryption tunnel wrapper
☆120Updated 5 years ago
Alternatives and similar repositories for CryptHook
Users that are interested in CryptHook are comparing it to the libraries listed below
Sorting:
- Linux v4.x.x Rootkit☆91Updated 11 months ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆54Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- A shellcode testing harness.☆69Updated last year
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Updated 4 years ago
- Inject shellcode into running processes in Linux.☆44Updated last year
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- ☆65Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Scripts created by MRG Effitas☆42Updated 8 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆89Updated last year