speknet / ping-backLinks
Linux backdoor using ICMP payload for activation
☆11Updated 11 years ago
Alternatives and similar repositories for ping-back
Users that are interested in ping-back are comparing it to the libraries listed below
Sorting:
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 5 years ago
- Anti live forensic linux LKM rootkit☆18Updated 8 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Windows Privilege Escalation☆10Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- ☆17Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese …☆13Updated 13 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆29Updated 11 years ago
- ☆22Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- A rootkit implemented as a linux kernel module☆18Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 7 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- PowerShell script to bypass UAC using DCCW☆19Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Updated 9 years ago
- ☆10Updated 7 years ago