Example of hooking a linux systemcall
☆63Dec 7, 2017Updated 8 years ago
Alternatives and similar repositories for superhide
Users that are interested in superhide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆29Aug 18, 2014Updated 11 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Automatic reversed shell detecting and defensing☆52Oct 25, 2018Updated 7 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- ☆18Jul 30, 2018Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 8 years ago