softasap / sa-secure-audit-rkhunterLinks
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special test…
☆14Updated 2 years ago
Alternatives and similar repositories for sa-secure-audit-rkhunter
Users that are interested in sa-secure-audit-rkhunter are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 12 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Detect Malware with Sandbox/VM evasion and Anti-debugging skills with some heur☆9Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- DiskCryptor - Open source partition encryption solution☆44Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 8 months ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago