dschuermann / suterusuLinks
Fork from http://redmine.poppopret.org/projects/suterusu. An LKM rootkit targeting Linux 2.6/3.x on x86 and ARM. Supports privilege escalation, process hiding, connection hiding (TCP/UDP v4/v6), file/directory hiding, keylogging, and screen unlocking. Under active development.
☆33Updated 12 years ago
Alternatives and similar repositories for suterusu
Users that are interested in suterusu are comparing it to the libraries listed below
Sorting:
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- ☆22Updated 6 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- ☆31Updated 9 years ago
- ☆49Updated 9 years ago
- ☆15Updated 9 years ago
- ☆51Updated 8 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- ☆16Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- plugin of ida with pin☆48Updated 4 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 12 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆49Updated 12 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- slide and full exploit☆86Updated 4 years ago
- ☆32Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- ida插件☆31Updated 9 years ago
- The slides and exploit of mosec2016☆112Updated 9 years ago
- ☆93Updated 10 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆8Updated 11 years ago