h2337 / modreveal
Utility to find hidden Linux kernel modules
☆144Updated 2 months ago
Alternatives and similar repositories for modreveal:
Users that are interested in modreveal are comparing it to the libraries listed below
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆182Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆122Updated 2 years ago
- eBPF hacks☆182Updated 2 months ago
- ☆201Updated 3 months ago
- reverse shell using curl☆205Updated 10 months ago
- PageBuster - dump all executable pages of packed processes.☆202Updated 3 years ago
- eBPF Port Knocking Tool☆232Updated last year
- Elf binary infector written in Go.☆206Updated last month
- WallEscape vulnerability in util-linux☆50Updated 10 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆159Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆144Updated 2 years ago
- A binary hardening system☆103Updated last year
- Zaps arguments and environment from the process list☆194Updated 9 months ago
- Linpmem is a linux memory acquisition tool☆77Updated 9 months ago
- LD_PRELOAD rootkit☆129Updated 11 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆86Updated last week
- Slides & Hands-on for the reverse engineering workshop☆177Updated 2 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆125Updated last week
- ☆168Updated 2 years ago
- LKRG bypass methods☆70Updated 5 years ago
- ☆77Updated 8 months ago
- ☆128Updated 2 years ago
- nysm is a stealth post-exploitation container.☆243Updated last year
- ☆131Updated 10 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆123Updated 3 months ago
- ☆122Updated last year
- Signing-key abuse and update exploitation framework☆123Updated 2 weeks ago
- ☆298Updated last year
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 7 months ago