linuxthor / rkbreakerLinks
Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes
☆12Updated 4 years ago
Alternatives and similar repositories for rkbreaker
Users that are interested in rkbreaker are comparing it to the libraries listed below
Sorting:
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- ☆33Updated 3 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆23Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 8 months ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- ☆21Updated 4 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 2 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 6 years ago
- ☆11Updated 3 years ago
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆12Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Bootkits☆18Updated last year
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆13Updated 3 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- Full chain Chrome 71.0.3578.98 exploit☆18Updated 3 years ago
- An opensource API hooking framework☆22Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago