mephistolist / titoLinks
In-Memory Rootkit For Linux and BSD
☆86Updated 4 months ago
Alternatives and similar repositories for tito
Users that are interested in tito are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆132Updated 8 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- ☆201Updated last week
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- This is practice VM for malware development☆169Updated 3 weeks ago
- Collection of codes focused on Linux rootkits☆187Updated last month
- PoC that downloads an executable from a public SSL certificate☆135Updated 4 months ago
- Analyse MSI files for vulnerabilities☆139Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 5 months ago
- Monarch - The Adversary Emulation Toolkit☆64Updated 11 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆76Updated last year
- ☆49Updated 5 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- ☆71Updated 10 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- Backdooring VSCode Projects☆81Updated 6 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 8 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- ☆108Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 7 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 9 months ago
- ☆39Updated last year