demon-i386 / jakshooLinks
LD_PRELOAD rootkit
☆5Updated 2 years ago
Alternatives and similar repositories for jakshoo
Users that are interested in jakshoo are comparing it to the libraries listed below
Sorting:
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 11 months ago
- Binary Golf Grand Prix☆60Updated 4 months ago
- RISC-V Virtual Machine☆232Updated last month
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆42Updated last year
- Collection of codes focused on Linux rootkits☆133Updated last month
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆84Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆113Updated 10 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- ☆147Updated 2 months ago
- A simple ptrace-less shared library injector for x64 Linux☆263Updated 2 years ago
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- Binary Golf Library☆62Updated 4 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆122Updated 5 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆168Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆124Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆81Updated 4 months ago
- ☆88Updated 5 months ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆82Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆15Updated 4 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆77Updated last month
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- Evasion by machine code de-optimization.☆389Updated 11 months ago
- Some of my windows kernel exploits for learning purposes☆129Updated 3 years ago
- Linux process injection PoCs☆31Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆116Updated 8 months ago