mrg0ne / kld-rootkitLinks
A collection of FreeBSD rootkit kernel modules and utilities
☆11Updated 3 weeks ago
Alternatives and similar repositories for kld-rootkit
Users that are interested in kld-rootkit are comparing it to the libraries listed below
Sorting:
- yet another hidden LKM hunter☆24Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆12Updated 5 months ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- ☆27Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆29Updated 5 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- ☆73Updated last year
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 3 years ago
- ☆25Updated 8 months ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Windows NTLM Authentication Backdoor☆18Updated 3 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- ☆31Updated 3 months ago
- Linux process injection PoCs☆31Updated last year
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆68Updated last month
- ☆33Updated 2 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- ☆37Updated 7 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- string encryption in Nim☆20Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago