elfmaster / kprobe_rootkit
Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)
☆37Updated 9 years ago
Alternatives and similar repositories for kprobe_rootkit:
Users that are interested in kprobe_rootkit are comparing it to the libraries listed below
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆39Updated last year
- Rootkit Detector for UNIX☆61Updated last year
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- ☆33Updated 9 years ago
- ☆50Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Rootkit☆21Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- ☆44Updated 6 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆37Updated 4 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- ☆15Updated 6 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- ☆14Updated 8 years ago
- ☆23Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Linux Rootkit Scanner☆86Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- ☆20Updated 7 years ago