m0nad / AssemblyLinks
Assembly/Shellcode
☆14Updated 10 years ago
Alternatives and similar repositories for Assembly
Users that are interested in Assembly are comparing it to the libraries listed below
Sorting:
- simple rootkit for computer security class☆14Updated 12 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆22Updated 11 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- ☆28Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Malware analysis tool☆22Updated 2 months ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Shellcodes for different usecases☆9Updated 9 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 12 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- A Unix rootkit☆17Updated 4 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 2 months ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- ☆15Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago