skyw4tch3r / RootKits-List-Download
This is the list of all rootkits found so far on github and other sites.
☆1,325Updated 2 years ago
Alternatives and similar repositories for RootKits-List-Download
Users that are interested in RootKits-List-Download are comparing it to the libraries listed below
Sorting:
- AntiVirus Evasion Tool☆1,701Updated 3 weeks ago
- Undetectable Windows Payload Generation☆1,595Updated 2 years ago
- awesome-linux-rootkits☆1,830Updated 4 months ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,393Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆798Updated last year
- Windows Exploits☆1,280Updated 4 years ago
- Python antivirus evasion tool☆1,411Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,375Updated last year
- List of Awesome Advanced Windows Exploitation References☆1,488Updated 3 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,636Updated 2 months ago
- ☆485Updated 4 years ago
- Unified repository for different Metasploit Framework payloads☆1,835Updated 3 months ago
- Antivirus evasion project☆1,105Updated 3 months ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,868Updated 4 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,013Updated last year
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,788Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,278Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆727Updated 2 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- Miscellaneous exploit code☆1,551Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,370Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,536Updated 7 months ago
- LKM Linux rootkit☆2,716Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,410Updated 6 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆652Updated last year
- Python Remote Administration Tool (RAT) to gain meterpreter session☆608Updated 6 months ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,119Updated 4 years ago