jarun / spy
Linux kernel mode debugfs keylogger
☆637Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for spy
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆945Updated 3 years ago
- SSH man-in-the-middle tool☆1,625Updated 3 years ago
- A tool to help you write binary exploits☆606Updated 5 years ago
- The dissection of a simple "hello world" ELF binary.☆457Updated 3 years ago
- powerful auto-backdooring utility☆742Updated 6 years ago
- A Linux packet crafting tool.☆463Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆555Updated 7 years ago
- A "living" Linux process with no memory☆342Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆642Updated 7 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆786Updated 7 months ago
- Some fun things you can do with kernel modules (all "bad ideas")☆437Updated 2 years ago
- Linux bind shell with anti-reverse engineering techniques☆284Updated 7 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆678Updated 9 months ago
- How to backdoor Diffie-Hellman☆609Updated 8 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆398Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆669Updated 2 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,573Updated last year
- - An Exploit Dev Swiss Army Knife.☆684Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆992Updated 3 years ago
- Inline C/asm in Bash☆251Updated 7 years ago
- The engine that powers DeLorean!☆830Updated 5 years ago
- My proof-of-concept exploits for the Linux kernel☆1,450Updated 2 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆458Updated 4 months ago
- Automated Linux evil maid attack☆420Updated 8 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆648Updated 6 years ago
- All your IPs are belong to us.☆667Updated 6 years ago
- Sample Rootkit for Linux☆391Updated 3 months ago
- A framework for wireless pentesting.☆1,196Updated 4 years ago