mempodippy / vlanyLinks
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
☆956Updated 4 years ago
Alternatives and similar repositories for vlany
Users that are interested in vlany are comparing it to the libraries listed below
Sorting:
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆803Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆657Updated 7 years ago
- LibZeroEvil & the Research Rootkit project.☆593Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆785Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,472Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 11 months ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,001Updated 3 years ago
- Sample Rootkit for Linux☆399Updated 10 months ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- Tool for extracting information from newly spawned processes☆759Updated last month
- kernel privilege escalation enumeration and exploitation framework☆691Updated 6 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- peinjector - MITM PE file infector☆604Updated 9 years ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- Linux Exploit Suggester; based on operating system release number☆1,793Updated 11 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆266Updated 8 years ago
- Shellcode Compiler☆1,111Updated 9 months ago
- PoC for Dirty COW (CVE-2016-5195)☆500Updated 3 years ago
- Hide processes as a normal user in Linux.☆258Updated 11 months ago
- Simple reverse ICMP shell☆1,594Updated 7 years ago
- binary patching from Python☆637Updated last year
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆469Updated 8 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,383Updated last year
- Payload Development Framework☆754Updated last week
- Script to execute in memory a sequence of opcodes☆411Updated 10 years ago
- A shellcode writing toolkit☆672Updated 3 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆814Updated 2 years ago