chokepoint / CryptHookLinks
TCP/UDP symmetric encryption tunnel wrapper
☆122Updated 5 years ago
Alternatives and similar repositories for CryptHook
Users that are interested in CryptHook are comparing it to the libraries listed below
Sorting:
- Linux v4.x.x Rootkit☆93Updated last year
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆106Updated 11 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- ☆65Updated 9 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆139Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Inject shellcode into running processes in Linux.☆43Updated last year
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- A collection of shellcodes☆70Updated 13 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Passive UAC elevation using dll infection☆75Updated 11 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- simple shellcode generator☆114Updated 8 years ago