linuxthor / rkbreakerLinks
Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes
☆12Updated 4 years ago
Alternatives and similar repositories for rkbreaker
Users that are interested in rkbreaker are comparing it to the libraries listed below
Sorting:
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- ☆33Updated 3 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 3 years ago
- ☆21Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 9 months ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Currently proof-of-concept☆17Updated 3 years ago
- ☆23Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Bootkits☆18Updated last year
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- ☆31Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 10 months ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆36Updated 4 years ago
- Utilities for working with vivisect☆25Updated 4 months ago
- Yet another Windows DLL injector.☆39Updated 3 years ago