softasap / sa-secure-audit-rkhunterLinks
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special test…
☆15Updated 2 years ago
Alternatives and similar repositories for sa-secure-audit-rkhunter
Users that are interested in sa-secure-audit-rkhunter are comparing it to the libraries listed below
Sorting:
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- drivesploit-testing☆26Updated 15 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- lkm rootkit☆15Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 10 years ago
- ☆27Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- A tool similar to netcat, but tunneled over DNS☆18Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated last year
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Updated 3 years ago