speknet / ping-backLinks
Linux backdoor using ICMP payload for activation
☆11Updated 11 years ago
Alternatives and similar repositories for ping-back
Users that are interested in ping-back are comparing it to the libraries listed below
Sorting:
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Anti live forensic linux LKM rootkit☆18Updated 8 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 5 years ago
- ☆10Updated 7 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 13 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- ☆22Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Updated 9 years ago
- A rootkit implemented as a linux kernel module☆18Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Shellcode injection using debugging APIs☆19Updated 12 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 12 years ago
- Post-explotation Hacks☆14Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- 🐧 A simple kernel-level rootkit☆21Updated 9 years ago
- ☆13Updated 8 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- wow64 syscall filter☆13Updated 11 years ago
- ☆22Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Updated 9 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago