m0hamed / lkm-rootkitLinks
A rootkit implemented as a linux kernel module
☆17Updated 10 years ago
Alternatives and similar repositories for lkm-rootkit
Users that are interested in lkm-rootkit are comparing it to the libraries listed below
Sorting:
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- ☆50Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆38Updated 10 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆34Updated 7 years ago
- ☆45Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- ☆28Updated 8 years ago
- RC4 Encryption with CryptoAPI and C☆15Updated 9 years ago
- Rootkit☆22Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 7 years ago