khale / kernel-rootkit-poc
PoC for a kernel rootkit
☆9Updated 5 years ago
Alternatives and similar repositories for kernel-rootkit-poc:
Users that are interested in kernel-rootkit-poc are comparing it to the libraries listed below
- Repo for various angr ipython features to give it more of a cli feeling☆55Updated last month
- ☆72Updated 3 years ago
- A library for patching ELFs☆53Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆152Updated 6 years ago
- Making Type Info Library (TIL) file for Apache modules☆54Updated 3 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆109Updated 4 years ago
- ☆84Updated last year
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- ☆134Updated 3 years ago
- ☆100Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Build your emulation environment as needed☆65Updated 3 years ago
- Example of using ELF hacking to inject malicious code into a target binary☆21Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 3 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 2 months ago
- A code-searching/completion tool, for IDA APIs☆82Updated last month
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- ☆89Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆79Updated 6 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago