majdi / deadlandsLinks
š§ A simple kernel-level rootkit
ā21Updated 9 years ago
Alternatives and similar repositories for deadlands
Users that are interested in deadlands are comparing it to the libraries listed below
Sorting:
- simple rootkit for computer security classā14Updated 12 years ago
- fun rootkits stuff!ā18Updated 10 years ago
- it's a simple LKM rootkit.ā12Updated 9 years ago
- just a basic rootkit for learning how to playing sys_call_tableā15Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalationā39Updated 8 years ago
- Rootkitā23Updated 10 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.ā23Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the ā¦ā10Updated 10 years ago
- ā15Updated 9 years ago
- ā34Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.ā15Updated 7 years ago
- Common Malware Techniquesā13Updated 2 years ago
- Malware analyses and helpful scriptsā29Updated 3 years ago
- x86_64 linux rootkit using debug registersā53Updated 3 years ago
- My solutions for random crackmes and other challengesā13Updated 5 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where nā¦ā22Updated 8 years ago
- ā23Updated 9 years ago
- findLoop - find possible encryption/decryption or compression/decompression codeā26Updated 6 years ago
- Intel PIN rocksā15Updated 13 years ago
- Malware monitor template based on MinHookā16Updated 10 years ago
- lkm rootkitā15Updated 11 years ago
- Framework complet d'analyse de malwareā12Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.ā22Updated 8 years ago
- Code Injector Using Code Cavesā15Updated 10 years ago
- A Unix rootkitā17Updated 5 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)ā32Updated 10 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysisā45Updated 8 years ago
- ā18Updated 8 years ago
- ā22Updated 8 years ago
- Ring3 Rootkit Backdoor.ā43Updated 10 years ago