linuxthor / rkspotter
Rootkit spotter - experimental Linux rootkit finder LKM
☆26Updated 4 years ago
Alternatives and similar repositories for rkspotter:
Users that are interested in rkspotter are comparing it to the libraries listed below
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆22Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆11Updated 4 years ago
- ☆27Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 9 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- yet another hidden LKM hunter☆17Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆24Updated 3 years ago
- Code injection from Linux kernel to a process☆19Updated last year
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 2 years ago
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆33Updated last month
- ☆17Updated 3 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- The Dumb Network Fuzzer☆19Updated last year