h2337 / modrevealLinks
Utility to find hidden Linux kernel modules
☆144Updated 5 months ago
Alternatives and similar repositories for modreveal
Users that are interested in modreveal are comparing it to the libraries listed below
Sorting:
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆130Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆114Updated this week
- A stealthy ELF loader - no files, no execve, no RWX☆164Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆188Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- ☆45Updated 2 months ago
- A binary hardening system☆109Updated last year
- LD_PRELOAD rootkit☆132Updated last year
- Elf binary infector written in Go.☆209Updated 4 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆127Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 weeks ago
- NIST-based CVE lookup store and API powered by Rust.☆130Updated 2 weeks ago
- ☆77Updated 11 months ago
- Zaps arguments and environment from the process list☆199Updated last year
- Execute ELF files without dropping them on disk☆492Updated 11 months ago
- Intercept stdin/stdout/stderr for any process☆198Updated 2 years ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated last year
- io_uring based rootkit☆192Updated last month
- eBPF hacks☆187Updated 5 months ago
- eBPF Port Knocking Tool☆234Updated last year
- reverse shell using curl☆206Updated 3 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆88Updated last year
- ☆277Updated 2 years ago
- ☆203Updated 7 months ago
- nysm is a stealth post-exploitation container.☆248Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- ☆123Updated last year
- ☆243Updated 2 years ago