demon-i386 / jakshoo
LD_PRELOAD rootkit
☆6Updated last year
Alternatives and similar repositories for jakshoo:
Users that are interested in jakshoo are comparing it to the libraries listed below
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 5 months ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 2 years ago
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆71Updated 4 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 8 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆53Updated 9 months ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- ☆46Updated 6 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- A simple ptrace-less shared library injector for x64 Linux☆253Updated 2 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆71Updated last year
- Abusing exceptions for code execution.☆108Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆116Updated last year
- RISC-V Virtual Machine☆212Updated last month
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆104Updated 2 years ago
- Binary Golf Grand Prix☆49Updated this week
- ☆11Updated 9 months ago
- Admin to Kernel code execution using the KSecDD driver☆243Updated 9 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆63Updated this week
- A dynamic unpacking tool☆130Updated last year
- Multiplatform CLI and GUI tool to show information about ELF files☆50Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- Collection of codes focused on Linux rootkits☆78Updated this week
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆59Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆265Updated last year
- Some of my windows kernel exploits for learning purposes☆121Updated 2 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago