kacheo / KernelRootkit
Linux kernel rootkit to hide certain files and processes.
☆35Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for KernelRootkit
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆35Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆41Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- x86_64 linux rootkit using debug registers☆50Updated 2 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- reversed emet tool☆24Updated 12 years ago
- ☆47Updated 7 years ago
- Using SEH to bypass CFG☆28Updated 7 years ago
- ☆31Updated 6 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆38Updated last year
- ☆22Updated 7 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- ☆26Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 7 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆29Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated last year
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- plugin of ida with pin☆48Updated 3 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆30Updated 7 years ago
- ☆34Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 3 years ago