nbulischeck / tytonLinks
Kernel-Mode Rootkit Hunter
☆370Updated 3 years ago
Alternatives and similar repositories for tyton
Users that are interested in tyton are comparing it to the libraries listed below
Sorting:
- linux rootkit adapted for 2.6 and 3.x☆214Updated 9 years ago
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- BEURK Experimental Unix RootKit☆381Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆673Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- ☆232Updated 6 years ago
- Script to execute in memory a sequence of opcodes☆413Updated 11 years ago
- linux rootkit☆160Updated 7 years ago
- Code for my 0x00sec.org posts☆325Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆494Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆802Updated last year
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- Linux Rootkit Scanner☆89Updated 3 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- A LKM rootkit for most newer kernel versions.☆178Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆276Updated 5 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆419Updated 7 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆207Updated 8 years ago
- The Multiplatform Linux Sandbox☆264Updated 3 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆663Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆206Updated 6 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- ☆384Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆743Updated last year
- Public work for CVE-2019-0708☆292Updated 5 years ago