juanschallibaum / Nuk3Gh0st
Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).
☆39Updated last year
Alternatives and similar repositories for Nuk3Gh0st:
Users that are interested in Nuk3Gh0st are comparing it to the libraries listed below
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- ☆33Updated 9 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 4 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆39Updated 10 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 10 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆69Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆72Updated 4 years ago
- ☆35Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Proof of calc for CVE-2019-6453☆49Updated last year
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆42Updated 7 years ago
- An unauthenticated PoC for CVE-2020-0796☆21Updated 5 years ago
- sploit☆68Updated 5 years ago
- ☆15Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago