linuxthor / rkspotter
Rootkit spotter - experimental Linux rootkit finder LKM
☆27Updated 4 years ago
Alternatives and similar repositories for rkspotter:
Users that are interested in rkspotter are comparing it to the libraries listed below
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- ☆27Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- yet another hidden LKM hunter☆19Updated last year
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆30Updated 4 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 10 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- ☆11Updated 5 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Flare-On solutions☆36Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆28Updated 4 months ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Code injection from Linux kernel to a process☆19Updated last year