ugly code to check linux kernel memory and dump some internal structures
☆48Nov 20, 2024Updated last year
Alternatives and similar repositories for lkcd
Users that are interested in lkcd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27May 4, 2018Updated 7 years ago
- ☆16Jun 23, 2024Updated last year
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 7 months ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Updated z0mbie MISTFALL engine☆17Jan 10, 2018Updated 8 years ago
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- ☆37Mar 26, 2021Updated 4 years ago
- GitHub Pages for Kernel Self Protection Project☆23Nov 8, 2025Updated 4 months ago
- A Roadmap that it is divided into weeks and tasks for beginners to learn and master data science☆10Oct 20, 2024Updated last year
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- libuargp extracted from uclibc, modified lightly, intl-friendly☆11Jun 11, 2021Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆39Feb 7, 2023Updated 3 years ago
- Linux Kernel Runtime Guard☆583Mar 17, 2026Updated last week
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.☆10Feb 3, 2024Updated 2 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆200Updated this week
- ☆13Dec 14, 2021Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆199Mar 14, 2024Updated 2 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 5 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- ☆15Mar 16, 2026Updated last week
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆67Feb 17, 2026Updated last month
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- ☆82Dec 4, 2022Updated 3 years ago