crudbug / simple-rootkitLinks
A simple attack against gcc and Python via kernel module, with highly detailed comments.
☆25Updated 11 years ago
Alternatives and similar repositories for simple-rootkit
Users that are interested in simple-rootkit are comparing it to the libraries listed below
Sorting:
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- ☆16Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- A Linux RAT in C☆34Updated 7 years ago
- ☆65Updated 9 years ago
- ☆36Updated 7 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Golang ransomware☆47Updated 4 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- ☆40Updated 7 years ago
- A way to backdoor every process☆68Updated 8 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Reverse Shell with Python 3☆26Updated 4 years ago