Simple process integrity checker Linux kernel module
☆15Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for proc-integrity
Users that are interested in proc-integrity are comparing it to the libraries listed below
Sorting:
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- `nansql` is a Golang library designed for managing connections to a database using the `sqlx` package. It provides a simple and efficient…☆16Sep 7, 2024Updated last year
- kvmm is a type2 hypervisor that uses the Linux Kernel Virtual Machine(KVM).☆12Feb 5, 2021Updated 5 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ARM Exploit 開発のためのトレーニングリポジトリ☆19May 23, 2020Updated 5 years ago
- simple C++ json library. (clone of kazuho/picojson)☆20Mar 10, 2022Updated 4 years ago
- Simple Library calls tracer☆22Feb 19, 2018Updated 8 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Jan 4, 2020Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- A refactored Proof-of-concept originally developed in 2017 to print all function calls with their arguments data types and values using P…☆18May 28, 2021Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- Lightweight framework for modular, event-based JavaScript programming☆47Apr 22, 2023Updated 2 years ago
- セキュリティ・キャンプ全国大会2020 オンライン B8講義資料☆18Nov 28, 2020Updated 5 years ago
- Reproducible localhost based on NixOS☆16Feb 13, 2023Updated 3 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated 2 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Aug 22, 2016Updated 9 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- distributed key-value cache (memcached in Linux Kernel)☆11Mar 15, 2017Updated 9 years ago
- Rag-bag of utilities and scripts that do strange things with ELF files☆18Nov 25, 2025Updated 3 months ago
- Node.js implementation of WebCrypto API☆11Jul 31, 2020Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Oct 13, 2022Updated 3 years ago
- Devkit for quickly creating client bots for remote communications☆15Jun 17, 2025Updated 9 months ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- ELF shared libraries injection to a remote process.☆17Oct 1, 2022Updated 3 years ago
- A curated list of software, services, and resources for SQLite☆17Jun 16, 2025Updated 9 months ago
- ☆20Mar 3, 2016Updated 10 years ago
- kprochide is an LKM for hiding processes from the userland. The module is able to hide multiple processes and is able to dynamically rece…☆22Oct 9, 2020Updated 5 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- ☆19Jan 17, 2016Updated 10 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- Provides an advanced search for browser bookmarks and histories.☆11May 17, 2025Updated 10 months ago