linuxthor / rkbreaker
Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes
☆12Updated 4 years ago
Alternatives and similar repositories for rkbreaker:
Users that are interested in rkbreaker are comparing it to the libraries listed below
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆15Updated 4 months ago
- ☆33Updated 3 years ago
- ☆21Updated 4 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆10Updated 7 years ago
- ☆12Updated 3 years ago
- ☆28Updated 4 months ago
- Miscellaneous old Exploit code and PoCs☆15Updated 5 months ago
- Tools for analyzing Windows containers and break container's isolation☆29Updated 2 years ago
- POC for CVE-2021-1699☆16Updated 3 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆18Updated 6 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆21Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- ☆14Updated 2 years ago
- An opensource API hooking framework☆22Updated 5 years ago
- ☆14Updated 5 years ago
- ☆16Updated 9 months ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- ☆22Updated 6 years ago