milabs / awesome-linux-rootkitsLinks
awesome-linux-rootkits
☆2,018Updated last week
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,247Updated last week
- This is the list of all rootkits found so far on github and other sites.☆1,419Updated 5 months ago
- A collection of links related to VMware escape exploits☆1,485Updated last year
- Linux Kernel Hacking☆747Updated last year
- List of Awesome Advanced Windows Exploitation References☆1,544Updated 4 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆817Updated last year
- A curated list of awesome privilege escalation☆1,506Updated 5 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,935Updated last year
- Various kernel exploits☆801Updated last year
- awesome list of browser exploitation tutorials☆2,260Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆3,479Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,553Updated 4 months ago
- fireELF - Fileless Linux Malware Framework☆679Updated 6 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,930Updated 11 months ago
- Research code & papers from members of vx-underground.☆1,351Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,306Updated 5 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,277Updated this week
- Red-Team LKM☆631Updated last month
- Resources for Windows exploit development☆1,649Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆1,009Updated 5 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,681Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,531Updated last year
- Linux Binary Exploitation☆1,354Updated 4 years ago
- ☆1,185Updated 8 years ago
- A curated list of awesome resources related to executable packing☆1,525Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,434Updated 4 months ago
- A handy collection of my public exploits, all in one place.☆672Updated 3 weeks ago
- Red Teaming Tactics and Techniques☆4,482Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,605Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 10 months ago