milabs / awesome-linux-rootkitsLinks
awesome-linux-rootkits
☆1,947Updated 8 months ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,148Updated 2 years ago
- This is the list of all rootkits found so far on github and other sites.☆1,379Updated last month
- Linux Kernel Hacking☆737Updated last year
- List of Awesome Advanced Windows Exploitation References☆1,516Updated 3 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,903Updated last year
- awesome list of browser exploitation tutorials☆2,215Updated 2 years ago
- A curated list of awesome privilege escalation☆1,420Updated last month
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆814Updated last year
- A collection of links related to VMware escape exploits☆1,462Updated last year
- fireELF - Fileless Linux Malware Framework☆675Updated 6 years ago
- Various kernel exploits☆795Updated last year
- Linux/Windows post-exploitation framework made by linux user☆1,625Updated last month
- ✍️ A curated list of CVE PoCs.☆3,443Updated 3 years ago
- Red-Team Linux kernel rootkit☆581Updated this week
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,155Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,264Updated 4 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,831Updated 7 months ago
- Research code & papers from members of vx-underground.☆1,299Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆863Updated 6 months ago
- My proof-of-concept exploits for the Linux kernel☆1,513Updated 3 weeks ago
- A curated list of awesome resources related to executable packing☆1,428Updated 3 months ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,101Updated 6 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,251Updated last year
- Resources for Windows exploit development☆1,615Updated 3 years ago
- A handy collection of my public exploits, all in one place.☆669Updated last week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆906Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,657Updated last week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,365Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,357Updated this week
- A set of Linux binary exploitation tasks for beginners on various architectures☆541Updated 3 years ago