niv256 / simple_rootkitLinks
A simple LKM kernel space rootkit for v5.x linux with multiple functions.
☆10Updated 4 years ago
Alternatives and similar repositories for simple_rootkit
Users that are interested in simple_rootkit are comparing it to the libraries listed below
Sorting:
- Yet another windows internals repo☆206Updated 3 years ago
- A virtualization-based endpoint security solution for Windows☆86Updated 4 years ago
- All my public vulnerabilities.☆13Updated 4 years ago
- ☆106Updated 6 years ago
- Set of antianalysis techniques found in malware☆132Updated last year
- ☆194Updated 7 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆229Updated 2 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆156Updated 5 years ago
- A LKM rootkit for most newer kernel versions.☆177Updated 7 years ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 7 years ago
- ☆12Updated 3 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆324Updated last year
- lowlevel cyber course - riscv & i8086 competition☆11Updated 6 years ago
- Dump of win32k POCs for bugs I've found☆377Updated 3 years ago
- My notes while studying Windows internals☆433Updated 7 months ago
- Windows Kernel Programming☆129Updated 5 years ago
- ☆162Updated 3 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- Kernel Exploits☆257Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆208Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆78Updated 7 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆225Updated 2 years ago
- A research paper about the internals of memory management and heap exploitation☆25Updated 2 years ago
- ☆119Updated 4 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- Reversing list☆149Updated last year
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆229Updated 4 years ago