niv256 / simple_rootkitLinks
A simple LKM kernel space rootkit for v5.x linux with multiple functions.
☆10Updated 5 years ago
Alternatives and similar repositories for simple_rootkit
Users that are interested in simple_rootkit are comparing it to the libraries listed below
Sorting:
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Updated 2 years ago
- Yet another windows internals repo☆212Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- Kernel Exploits☆260Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆257Updated 3 years ago
- ☆200Updated 8 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- All my public vulnerabilities.☆14Updated 5 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- ☆81Updated 8 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Updated 5 years ago
- ☆110Updated 6 years ago
- ☆119Updated 5 years ago
- ☆163Updated 4 years ago
- A virtualization-based endpoint security solution for Windows☆88Updated 4 years ago
- ☆56Updated 7 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆114Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Updated last year
- Windows Pwnable Study☆403Updated 7 months ago
- A LKM rootkit for most newer kernel versions.☆180Updated 8 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Our CTF Write-Up / solve scripts☆22Updated 2 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆233Updated 3 months ago
- A research paper about the internals of memory management and heap exploitation☆27Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 6 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆437Updated 9 months ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆171Updated 7 months ago
- A collection of themes based on pastel colors, created for reverse engineers☆158Updated 10 months ago