le4ker / linux-kernel-security-suiteLinks
A collection of linux kernel modules that harden the kernel
☆16Updated 9 years ago
Alternatives and similar repositories for linux-kernel-security-suite
Users that are interested in linux-kernel-security-suite are comparing it to the libraries listed below
Sorting:
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- ☆14Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- UAC Copy Tool☆9Updated 9 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- ☆16Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- lkm rootkit☆15Updated 11 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago