kacheo / KernelRootkit
Linux kernel rootkit to hide certain files and processes.
☆36Updated 10 years ago
Alternatives and similar repositories for KernelRootkit:
Users that are interested in KernelRootkit are comparing it to the libraries listed below
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Rootkit☆21Updated 10 years ago
- ☆50Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- reversed emet tool☆24Updated 12 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- ☆31Updated 7 years ago
- ☆22Updated 7 years ago
- ☆28Updated 7 years ago
- ☆14Updated 8 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆30Updated 7 years ago
- A dark theme for WinDBG.☆35Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated last year
- crash poc & Leak info PoC☆18Updated 6 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆54Updated 13 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Linux rootkit experimentations☆18Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago