jermeyyy / rooty
Academic project of Linux rootkit made for Bachelor Engineering Thesis.
☆94Updated 5 months ago
Alternatives and similar repositories for rooty:
Users that are interested in rooty are comparing it to the libraries listed below
- LD_PRELOAD rootkit☆127Updated 10 months ago
- Code snippets for bare-metal malware development☆97Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆225Updated last month
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆218Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆241Updated last year
- Kernel Exploits☆247Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆120Updated 3 years ago
- bdvl☆111Updated 2 years ago
- Elf binary infector written in Go.☆206Updated last week
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord …☆178Updated 3 years ago
- A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.☆406Updated last year
- GhostWriting Injection Technique.☆166Updated 6 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆63Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- Linux kernel rootkit☆307Updated this week
- A utility to fix intentionally corrupted UPX packed files.☆82Updated last year
- ☆54Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆74Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆71Updated 7 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆119Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆359Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 4 months ago
- Yet another variant of Process Hollowing☆357Updated 10 months ago
- Linux Kernel module-less implant (backdoor)☆68Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆627Updated 2 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆572Updated last year