chokepoint / CryptHookLinks
TCP/UDP symmetric encryption tunnel wrapper
☆123Updated 5 years ago
Alternatives and similar repositories for CryptHook
Users that are interested in CryptHook are comparing it to the libraries listed below
Sorting:
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Inject shellcode into running processes in Linux.☆43Updated last year
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- ☆63Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A collection of shellcodes☆70Updated 13 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A shellcode testing harness.☆70Updated last year
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆95Updated last month
- A rootkit implemented as a linux kernel module☆18Updated 10 years ago
- Scripts created by MRG Effitas☆42Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- See here:☆43Updated 13 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago