m0hamed / lkm-rootkitView external linksLinks
A rootkit implemented as a linux kernel module
☆18May 2, 2015Updated 10 years ago
Alternatives and similar repositories for lkm-rootkit
Users that are interested in lkm-rootkit are comparing it to the libraries listed below
Sorting:
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Implementation of the paper: "High-dimensional Bayesian optimization using low-dimensional feature spaces".☆21Sep 11, 2020Updated 5 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Scans tcl for command injection☆17Mar 8, 2020Updated 5 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 12 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆27Nov 23, 2017Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago