Utility to find hidden Linux kernel modules
☆147Jul 21, 2025Updated 8 months ago
Alternatives and similar repositories for modreveal
Users that are interested in modreveal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- This is a soft fork of the Megalodon app, which itself is a fork of the official Mastodon Android app.☆14Jan 27, 2023Updated 3 years ago
- Malware to gain persistence on a victims machine.☆20Feb 12, 2023Updated 3 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,277Mar 10, 2026Updated last week
- ☆12Jun 29, 2021Updated 4 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆266Dec 6, 2025Updated 3 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- ☆39Jan 24, 2024Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- ☆27May 6, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Jan 19, 2023Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- A Simple Proof Code for Extracting and Executing Shellcode from Event Logs☆27Mar 5, 2023Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory☆223May 28, 2022Updated 3 years ago
- Tool to get NT system shell .☆11Jun 29, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆785Jun 23, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆33Sep 24, 2021Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago