elfmaster / kprobe_rootkitLinks
Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)
☆38Updated 10 years ago
Alternatives and similar repositories for kprobe_rootkit
Users that are interested in kprobe_rootkit are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated last year
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- Linux Rootkit Scanner☆89Updated 3 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆40Updated 2 years ago
- ☆33Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Rootkit☆22Updated 10 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆28Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Enhanced version of secdev's shellforge G3. More platforms and architectures supported.☆45Updated 2 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 12 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 7 years ago
- Linux v4.x.x Rootkit☆91Updated 11 months ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆50Updated 8 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆52Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago