chokepoint / jynxkit
JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor
☆56Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for jynxkit
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- ☆64Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- public bugs/proof of concepts☆47Updated 3 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆76Updated 5 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆52Updated 9 years ago
- A simple shellcode runner☆20Updated 10 years ago
- ☆29Updated 8 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- Linux bootkit generator☆22Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Passive UAC elevation using dll infection☆71Updated 10 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago