h2337 / modrevealLinks
Utility to find hidden Linux kernel modules
☆146Updated 5 months ago
Alternatives and similar repositories for modreveal
Users that are interested in modreveal are comparing it to the libraries listed below
Sorting:
- A binary hardening system☆111Updated 2 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆142Updated 2 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- io_uring based rootkit☆247Updated 8 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆197Updated 2 years ago
- NIST-based CVE lookup store and API powered by Rust.☆136Updated 4 months ago
- Signing-key abuse and update exploitation framework☆132Updated 8 months ago
- eBPF hacks☆194Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- Elf binary infector written in Go.☆214Updated last year
- eBPF Port Knocking Tool☆237Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Zaps arguments and environment from the process list☆240Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Mara is a userland pty/tty sniffer☆53Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- ☆170Updated 3 years ago
- ☆97Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆126Updated last month
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- ☆79Updated last year
- LKRG bypass methods☆73Updated 6 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆172Updated 2 years ago
- ☆137Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago