jarun / spy
Linux kernel mode debugfs keylogger
☆653Updated 2 years ago
Alternatives and similar repositories for spy:
Users that are interested in spy are comparing it to the libraries listed below
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- A tool to help you write binary exploits☆607Updated 5 years ago
- A Linux packet crafting tool.☆465Updated 4 years ago
- The dissection of a simple "hello world" ELF binary.☆461Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆672Updated 2 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆646Updated 7 years ago
- A linux-based assembly REPL for x86, amd64, armv7, and armv8☆1,181Updated 11 months ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- peinjector - MITM PE file infector☆602Updated 8 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-…☆869Updated 5 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,254Updated 2 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- - An Exploit Dev Swiss Army Knife.☆691Updated 3 years ago
- A command-line network packet crafting and injection utility☆505Updated last year
- like ~~grep~~ UBER, but for binaries☆1,724Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆892Updated 3 years ago
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆261Updated 8 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆401Updated 4 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆794Updated 10 months ago
- SSH man-in-the-middle tool☆1,644Updated 3 years ago
- Some fun things you can do with kernel modules (all "bad ideas")☆437Updated 2 years ago
- A "living" Linux process with no memory☆343Updated 4 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆781Updated last week
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆559Updated 8 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,578Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,462Updated 2 years ago