kevinkoo001 / rootkit
This project has been done with Chen as part of system security course at SBU CS.
☆12Updated 10 years ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- simple rootkit for computer security class☆14Updated 12 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- ☆14Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Rootkit☆21Updated 10 years ago
- Shellcode tracer☆15Updated 8 years ago
- Anti live forensic linux LKM rootkit☆17Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- ☆10Updated 2 weeks ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 9 years ago
- ☆28Updated 7 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- An experimental rootkit for Android☆26Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆21Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆42Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- fast dirtycow implementation with privilege escalation for amd64 in flatassembler.☆6Updated 8 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago