milabs / awesome-linux-rootkits
awesome-linux-rootkits
☆1,752Updated last week
Alternatives and similar repositories for awesome-linux-rootkits:
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
- LKM Linux rootkit☆2,638Updated 3 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆1,898Updated last year
- This is the list of all rootkits found so far on github and other sites.☆1,290Updated last year
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆790Updated 9 months ago
- awesome list of browser exploitation tutorials☆2,080Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,528Updated this week
- List of Awesome Advanced Windows Exploitation References☆1,472Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,386Updated 4 months ago
- ✍️ A curated list of CVE PoCs.☆3,356Updated 3 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,804Updated 9 months ago
- Linux Kernel Hacking☆661Updated 9 months ago
- My proof-of-concept exploits for the Linux kernel☆1,458Updated 2 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,335Updated 4 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,470Updated 3 months ago
- Various kernel exploits☆753Updated 10 months ago
- A curated list of awesome privilege escalation☆1,257Updated 7 months ago
- ☆1,129Updated 7 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,195Updated 9 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,873Updated last year
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- A collaborative, multi-platform, red teaming framework☆3,373Updated 2 weeks ago
- A collection of links related to Linux kernel security and exploitation☆5,724Updated last week
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,194Updated 5 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,464Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,271Updated 2 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,067Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,005Updated last year