d3npa / freebsd-rootkitsLinks
Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2
☆50Updated 3 years ago
Alternatives and similar repositories for freebsd-rootkits
Users that are interested in freebsd-rootkits are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆61Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Reverse engineering software using a full system simulator☆191Updated this week
- Anti-reverse Compilation☆34Updated 4 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆111Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- Learning FreeBSD Kernel Hacking - Exercises☆44Updated 5 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆126Updated last month
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 3 weeks ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆93Updated 3 years ago
- ☆108Updated 6 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- ☆64Updated last year
- yxd - Yuu's heX Dumper☆92Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- ☆48Updated 5 years ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- ☆103Updated 3 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆90Updated 2 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- Make your Ghidra Lazy!☆155Updated 5 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year