kacheo / KernelRootkit
Linux kernel rootkit to hide certain files and processes.
☆36Updated 11 years ago
Alternatives and similar repositories for KernelRootkit
Users that are interested in KernelRootkit are comparing it to the libraries listed below
Sorting:
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆39Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 9 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- ☆49Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Rootkit☆21Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- ☆31Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- ☆34Updated 7 years ago
- CVE-2014-0816☆25Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 11 years ago
- reversed emet tool☆24Updated 12 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated last year
- ☆22Updated 7 years ago