majdi / deadlands
π§ A simple kernel-level rootkit
β20Updated 9 years ago
Alternatives and similar repositories for deadlands:
Users that are interested in deadlands are comparing it to the libraries listed below
- simple rootkit for computer security classβ14Updated 12 years ago
- Yet Another Repetitive Rootkitβ9Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_tableβ14Updated 8 years ago
- it's a simple LKM rootkit.β12Updated 8 years ago
- β14Updated 9 years ago
- fun rootkits stuff!β18Updated 9 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any injβ¦β18Updated 7 years ago
- β28Updated 7 years ago
- lkm rootkitβ15Updated 10 years ago
- β13Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.β15Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )β10Updated 8 years ago
- An IDA Pro script for creating a clearer idb for nymaim malwareβ10Updated 6 years ago
- Framework complet d'analyse de malwareβ12Updated 9 years ago
- β12Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where nβ¦β22Updated 7 years ago
- IDA WhatAPIs PlugInβ7Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalationβ38Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alikeβ17Updated 10 years ago
- β23Updated 9 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easilyβ14Updated 6 years ago
- Static analysis tools for x86 assemblyβ13Updated 8 years ago
- A rootkit for linux kernel >= 3.0β19Updated 10 years ago
- Kernel Shellcode to add all privileges in tokenβ13Updated 8 years ago
- Zerokit shared codeβ16Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression codeβ26Updated 5 years ago
- CVE-2014-0816β25Updated 8 years ago
- Common Malware Techniquesβ13Updated last year
- β16Updated 7 years ago
- β33Updated 7 years ago