linuxthor / rkspotterLinks
Rootkit spotter - experimental Linux rootkit finder LKM
☆30Updated 4 years ago
Alternatives and similar repositories for rkspotter
Users that are interested in rkspotter are comparing it to the libraries listed below
Sorting:
- yet another hidden LKM hunter☆24Updated last year
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- ☆27Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- ☆28Updated 7 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆21Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- ☆13Updated 2 years ago
- ☆12Updated 8 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago
- ☆18Updated 5 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- ☆11Updated 2 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago