jarun / spyLinks
Linux kernel mode debugfs keylogger
☆667Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆959Updated 4 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- A simple keylogger for Linux systems☆114Updated 11 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆682Updated 3 years ago
- The dissection of a simple "hello world" ELF binary.☆464Updated 4 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- The decompiled Morris Worm source code☆630Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆564Updated 8 years ago
- peinjector - MITM PE file infector☆606Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆659Updated 7 years ago
- Architectural privilege escalation on x86☆852Updated 7 years ago
- A Linux packet crafting tool.☆470Updated 4 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- like ~~grep~~ UBER, but for binaries☆1,741Updated 2 years ago
- ☆352Updated 3 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆706Updated last year
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆794Updated last year
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆804Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated last year
- All your IPs are belong to us.☆670Updated 7 years ago
- Docker configuration for building Linux From Scratch system☆664Updated 11 months ago
- SSH man-in-the-middle tool☆1,680Updated 4 years ago
- MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-…☆881Updated 6 years ago
- A GNU/Linux keylogger that works!☆798Updated 2 weeks ago
- powerful auto-backdooring utility☆748Updated 7 years ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Updated 9 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,595Updated last month
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆380Updated 4 years ago