m0nad / AssemblyLinks
Assembly/Shellcode
☆14Updated 11 years ago
Alternatives and similar repositories for Assembly
Users that are interested in Assembly are comparing it to the libraries listed below
Sorting:
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Updated 11 years ago
- simple rootkit for computer security class☆14Updated 13 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- ☆28Updated 9 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆15Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- ☆15Updated 9 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- An experimental rootkit for Android☆26Updated 12 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 8 months ago
- ☆23Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- it's a simple LKM rootkit.☆12Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- A Unix rootkit☆16Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 9 months ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- reverse engineering, visual binary analysis☆24Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- fun rootkits stuff!☆19Updated 10 years ago
- lkm rootkit☆15Updated 11 years ago