softasap / sa-secure-audit-rkhunter
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special test…
☆14Updated 2 years ago
Alternatives and similar repositories for sa-secure-audit-rkhunter:
Users that are interested in sa-secure-audit-rkhunter are comparing it to the libraries listed below
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆36Updated 6 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆24Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Python libraries for Windows system coding☆14Updated 4 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Network white noise collector☆18Updated 9 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Kernel heap read buffer overflow on macOS/iOS requiring root.☆10Updated 7 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- eqgrp-auction decrypted☆12Updated 7 years ago
- File antivirus☆10Updated 5 years ago
- An application for obtaining, dumping and modifying token from user land.☆27Updated 9 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago