majdi / deadlands
π§ A simple kernel-level rootkit
β20Updated 9 years ago
Alternatives and similar repositories for deadlands:
Users that are interested in deadlands are comparing it to the libraries listed below
- Yet Another Repetitive Rootkitβ9Updated 11 years ago
- simple rootkit for computer security classβ14Updated 12 years ago
- it's a simple LKM rootkit.β12Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_tableβ14Updated 8 years ago
- β14Updated 9 years ago
- fun rootkits stuff!β18Updated 9 years ago
- My solutions for random crackmes and other challengesβ11Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any injβ¦β18Updated 7 years ago
- β24Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.β15Updated 7 years ago
- A rootkit for linux kernel >= 3.0β19Updated 10 years ago
- Common Malware Techniquesβ13Updated 2 years ago
- β28Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the β¦β10Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers preseβ¦β13Updated 12 years ago
- Static analysis tools for x86 assemblyβ13Updated 8 years ago
- β12Updated 7 years ago
- Kernel Shellcode to add all privileges in tokenβ13Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where nβ¦β22Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )β10Updated 9 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.β22Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression codeβ26Updated 6 years ago
- β11Updated 6 years ago
- Kernel mode windows NT API loggerβ22Updated 5 years ago
- β13Updated 7 years ago
- lkm rootkitβ15Updated 10 years ago
- My manual analysis of malware familiesβ13Updated 7 years ago
- IDA WhatAPIs PlugInβ7Updated 9 years ago
- Experimental Windows .text section Patch Detectorβ21Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source codeβ14Updated 10 years ago