jarun / spy
Linux kernel mode debugfs keylogger
☆665Updated 3 years ago
Alternatives and similar repositories for spy
Users that are interested in spy are comparing it to the libraries listed below
Sorting:
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆463Updated 10 months ago
- The dissection of a simple "hello world" ELF binary.☆463Updated 4 years ago
- peinjector - MITM PE file infector☆603Updated 9 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- LLDB MCP Integration + other helpful commands☆724Updated last month
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆563Updated 8 years ago
- The engine that powers DeLorean!☆834Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆784Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,258Updated 2 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆656Updated 7 years ago
- All your IPs are belong to us.☆670Updated 6 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,000Updated 3 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- Inline C/asm in Bash☆251Updated 7 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆786Updated 3 months ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆266Updated 8 years ago
- like ~~grep~~ UBER, but for binaries☆1,731Updated 2 years ago
- Encrypted personal archives☆658Updated 2 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago