leixiangwu / CSE509-RootkitLinks
After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded in…
☆35Updated 8 years ago
Alternatives and similar repositories for CSE509-Rootkit
Users that are interested in CSE509-Rootkit are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Tinba Banking Trojan☆86Updated 10 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Linux v4.x.x Rootkit☆91Updated 11 months ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆130Updated 8 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- A General Purpose DLL & Code Injection Utility☆154Updated 7 years ago
- KINS Banking Trojan☆62Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- Carberp Banking Trojan☆117Updated 10 years ago
- simple shellcode generator☆113Updated 8 years ago
- Another dll injection tool.☆29Updated 10 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆118Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 8 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- ☆65Updated 8 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- A way to backdoor every process☆66Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Updated 8 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- some pocs for antivirus evasion☆131Updated last year
- Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI☆76Updated 7 years ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago