compilepeace / EVIL_RABBITLinks
-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.
☆28Updated 4 years ago
Alternatives and similar repositories for EVIL_RABBIT
Users that are interested in EVIL_RABBIT are comparing it to the libraries listed below
Sorting:
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆28Updated 6 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- ☆136Updated 7 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- bdvl☆114Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- ☆67Updated 2 years ago
- ☆48Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- ☆90Updated 4 years ago
- Matryoshka - stacked LKM loader☆53Updated 2 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Windows Stagers to circumvent restrictive network environments☆67Updated last year
- ☆64Updated last year
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆187Updated 8 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago