nbulischeck / tyton
Kernel-Mode Rootkit Hunter
☆362Updated 3 years ago
Alternatives and similar repositories for tyton:
Users that are interested in tyton are comparing it to the libraries listed below
- Linux Rootkit Scanner☆87Updated 3 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆661Updated 5 years ago
- linux rootkit☆157Updated 7 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- linux rootkit adapted for 2.6 and 3.x☆208Updated 9 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆271Updated 5 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- ☆235Updated 6 years ago
- Decept Network Protocol Proxy☆275Updated 2 years ago
- BEURK Experimental Unix RootKit☆380Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- A LKM rootkit for most newer kernel versions.☆172Updated 7 years ago
- Hide processes as a normal user in Linux.☆254Updated 7 months ago
- Linux kernel exploitation experiments☆191Updated 3 weeks ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 7 years ago
- collection of verified Linux kernel exploits