Linux rootkit for kernel 4.9.133
☆16Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for linux_rootkit
Users that are interested in linux_rootkit are comparing it to the libraries listed below
Sorting:
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago
- ☆17Jun 26, 2025Updated 8 months ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- External-CS2 is an external cheat for Counter-Strike 2 that operates independently of the game's memory and is intended to improve Window…☆23Oct 30, 2024Updated last year
- This is the repo for remote direct memory introspection.☆23Jun 21, 2023Updated 2 years ago
- ☆22Oct 31, 2025Updated 4 months ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Explore the universe of spaceflight news with Spaceflight News API and htmx.org☆14Mar 15, 2025Updated last year
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- simpleR1: A Simple Framework for Training R1-like Models☆30Aug 12, 2025Updated 7 months ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Lagrange interpolation polynomials in C++11☆10Mar 1, 2018Updated 8 years ago
- C#的GUI五子棋大作业 包括禁手 AI 简单直播功能☆10Dec 14, 2018Updated 7 years ago
- Flexible, high performance IMDB & disk hybrid database written in Go. Features a brand-new modernistic query language and deep schema va…☆13Apr 21, 2024Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- [On Going] The is the ultimate blogging site made with Django Rest and Svelte/Kit☆13Jul 14, 2023Updated 2 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- ☆15Mar 5, 2024Updated 2 years ago
- The CS2 Battle Discord Bot is your go-to solution for seamlessly organizing and enjoying 5v5 matches with your friends directly on your D…☆15May 11, 2025Updated 10 months ago
- Understanding some of the Anti-Reversing Techniques☆11Oct 6, 2019Updated 6 years ago
- Code for the post "Elliptic Curves as Python Objects" implementing elliptic curve point addition over rational numbers.☆21Jun 9, 2020Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Match3 game with PixiJS☆17Dec 1, 2022Updated 3 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- ☆26Nov 20, 2019Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago