oblique / elf-infectorLinks
ELF binary infector
☆32Updated 14 years ago
Alternatives and similar repositories for elf-infector
Users that are interested in elf-infector are comparing it to the libraries listed below
Sorting:
- runtime code injector for Linux☆27Updated 14 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Inject shellcode into running processes in Linux.☆43Updated 10 months ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 11 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- ☆33Updated 9 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Linux v4.x.x Rootkit☆90Updated 10 months ago
- A collection of shellcodes☆69Updated 13 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Execute system calls over the network☆11Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago