mephistolist / tito
In-Memory Rootkit For Linux
☆70Updated 2 weeks ago
Alternatives and similar repositories for tito:
Users that are interested in tito are comparing it to the libraries listed below
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆69Updated this week
- Collection of codes focused on Linux rootkits☆91Updated this week
- UAC Bypass using CMSTP in Rust☆24Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆49Updated 2 months ago
- Repo for all my exploits/PoCs☆47Updated last week
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated last month
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆34Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- ☆103Updated 4 months ago
- ☆58Updated 4 months ago
- Monarch - The Adversary Emulation Toolkit☆60Updated last month
- Make an Linux Kernel rootkit visible again.☆47Updated this week
- Stage 0☆153Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- Windows rootkit designed to work with BYOVD exploits☆161Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆137Updated 6 months ago
- A Mythic Agent written in PIC C.☆175Updated 3 weeks ago
- ☆18Updated 3 weeks ago
- Analyse MSI files for vulnerabilities☆124Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆50Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆87Updated 2 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated last month
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆206Updated 3 months ago
- ☆186Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆86Updated last year
- early cascade injection PoC based on Outflanks blog post☆207Updated 3 months ago