oblique / elf-infector
ELF binary infector
☆32Updated 13 years ago
Alternatives and similar repositories for elf-infector:
Users that are interested in elf-infector are comparing it to the libraries listed below
- runtime code injector for Linux☆27Updated 13 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆39Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- Rootkit Detector for UNIX☆61Updated last year
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 11 years ago
- ☆33Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux kernel modules developed by me for learning purposes☆20Updated 12 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A collection of shellcodes☆68Updated 12 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Linux bootkit generator☆22Updated 10 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- LD_PRELOAD rootkit detection & research.☆10Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago