nbulischeck / tyton
Kernel-Mode Rootkit Hunter
☆366Updated 3 years ago
Alternatives and similar repositories for tyton:
Users that are interested in tyton are comparing it to the libraries listed below
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- linux rootkit☆159Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- linux rootkit adapted for 2.6 and 3.x☆208Updated 9 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆745Updated last year
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Linux Rootkit Scanner☆86Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- BEURK Experimental Unix RootKit☆382Updated 7 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆206Updated 7 years ago
- ☆283Updated 4 years ago
- ☆606Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆954Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 7 years ago
- The Multiplatform Linux Sandbox☆260Updated 3 years ago
- A LKM rootkit for most newer kernel versions.☆173Updated 7 years ago
- ☆191Updated 7 years ago
- ☆234Updated 6 years ago
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆228Updated 5 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆163Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- ☆381Updated last year
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆185Updated 10 months ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆410Updated 6 years ago