softasap / sa-secure-audit-rkhunterLinks
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special test…
☆15Updated 2 years ago
Alternatives and similar repositories for sa-secure-audit-rkhunter
Users that are interested in sa-secure-audit-rkhunter are comparing it to the libraries listed below
Sorting:
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- drivesploit-testing☆26Updated 15 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- WAF Exploitation Framework☆13Updated 2 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- DiskCryptor - Open source partition encryption solution☆42Updated 11 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 10 months ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- ☆47Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- A tool similar to netcat, but tunneled over DNS☆18Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago