compilepeace / EVIL_RABBITLinks
-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.
☆28Updated 4 years ago
Alternatives and similar repositories for EVIL_RABBIT
Users that are interested in EVIL_RABBIT are comparing it to the libraries listed below
Sorting:
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 3 years ago
- ☆28Updated 6 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- bdvl☆114Updated 3 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- ☆136Updated 5 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- LD_PRELOAD rootkit☆135Updated last year
- ☆64Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- ☆48Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 11 months ago
- yet another hidden LKM hunter☆25Updated last year
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago