demon-i386 / jakshooLinks
LD_PRELOAD rootkit
☆5Updated 2 years ago
Alternatives and similar repositories for jakshoo
Users that are interested in jakshoo are comparing it to the libraries listed below
Sorting:
- Binary Golf Grand Prix☆61Updated 4 months ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- Linux process injection PoCs☆29Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- RISC-V Virtual Machine☆243Updated 2 months ago
- Collection of codes focused on Linux rootkits☆143Updated last month
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆45Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆17Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ☆151Updated last week
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 11 months ago
- A simple ptrace-less shared library injector for x64 Linux☆263Updated 2 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 8 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆113Updated 11 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆117Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆124Updated 2 years ago
- ☆64Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 7 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated 10 months ago
- yxd - Yuu's heX Dumper☆90Updated last year
- examples of using radius2 to solve reversing challenges☆35Updated 7 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆78Updated 2 months ago
- Anti-analysis tool that obfuscates ELF files☆31Updated 4 years ago
- ☆12Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 9 months ago