linuxthor / rkbreaker
Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes
☆12Updated 4 years ago
Alternatives and similar repositories for rkbreaker:
Users that are interested in rkbreaker are comparing it to the libraries listed below
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 5 months ago
- ☆33Updated 3 years ago
- ☆21Updated 4 years ago
- POC for CVE-2021-1699☆16Updated 4 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- ☆12Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆28Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Tools for analyzing Windows containers and break container's isolation☆31Updated 2 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Code Integrity Violation Spotter☆16Updated 10 months ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆22Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- ☆14Updated 5 years ago
- Slides from various conference talks☆36Updated last year
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 5 years ago
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆12Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- ☆11Updated 3 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- ☆13Updated 3 years ago
- ☆22Updated 6 years ago