ksen-lin / nitara2Links
yet another hidden LKM hunter
☆24Updated last year
Alternatives and similar repositories for nitara2
Users that are interested in nitara2 are comparing it to the libraries listed below
Sorting:
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- PoC code and tools for Black Hat USA 2024☆21Updated 11 months ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆62Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 6 months ago
- ☆27Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 8 months ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 weeks ago
- ☆28Updated 5 months ago
- Code injection from Linux kernel to a process☆21Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- ☆13Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- ☆18Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Slides about HyperDbg☆30Updated 3 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 7 months ago
- Linux rootkit for educational purposes☆32Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- ☆47Updated 3 years ago
- Analysis of the vulnerability☆51Updated last year
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- TrustZone Trusted Application 0-Days by Design☆22Updated 2 months ago