demon-i386 / jakshoo
LD_PRELOAD rootkit
☆5Updated 2 years ago
Alternatives and similar repositories for jakshoo:
Users that are interested in jakshoo are comparing it to the libraries listed below
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 7 months ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated 2 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- ☆73Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 10 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆70Updated 8 months ago
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- A simple multiplatform command line search tool for Windows API.☆45Updated 3 weeks ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆75Updated last month
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆62Updated last year
- ☆37Updated 10 months ago
- Collection of codes focused on Linux rootkits☆95Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆33Updated this week
- ☆95Updated 3 years ago
- ☆63Updated last year
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated last year
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- RISC-V Virtual Machine☆214Updated last month
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆76Updated 7 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆38Updated last year
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆9Updated last year