geekben / rootkit
Linux rootkit and detection examples
☆32Updated 9 years ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- windows kernel vulnerability found by me☆90Updated 7 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- ☆34Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- ☆19Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆75Updated 6 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- ☆45Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Linux local root exploit for CVE-2014-0038☆193Updated 11 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆52Updated 10 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- Fuzzer☆43Updated 10 years ago
- PyCommands for Immunity Debugger☆27Updated 12 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago