crudbug / simple-rootkit
A simple attack against gcc and Python via kernel module, with highly detailed comments.
☆21Updated 10 years ago
Alternatives and similar repositories for simple-rootkit:
Users that are interested in simple-rootkit are comparing it to the libraries listed below
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- ☆16Updated 5 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆155Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- Steal users password with a fake sudo function.☆42Updated last year
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- ☆43Updated 5 years ago
- ☆27Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- ☆15Updated 4 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Reverse Windows shell over TLS☆18Updated 9 years ago
- ☆25Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago