rootkiter / phrack
www.phrack.org
☆71Updated last year
Related projects ⓘ
Alternatives and complementary repositories for phrack
- ☆100Updated 6 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆59Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆63Updated 3 years ago
- Copy of the contents at phrack.com☆35Updated 2 months ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- ☆44Updated 6 years ago
- ☆82Updated last year
- Attacking the Core associated source files☆86Updated 6 years ago
- x86_64 linux rootkit using debug registers☆50Updated 2 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆29Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- My public presentations☆41Updated last year
- UAC 0Day all day!☆58Updated 7 years ago
- hax 'n shit☆118Updated 9 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- For code snippets and information☆41Updated 5 years ago
- ☆88Updated 5 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆47Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆86Updated 3 years ago
- Kernel Hacking study materials collection☆106Updated 8 years ago