speknet / ping-backLinks
Linux backdoor using ICMP payload for activation
☆11Updated 11 years ago
Alternatives and similar repositories for ping-back
Users that are interested in ping-back are comparing it to the libraries listed below
Sorting:
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 5 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆15Updated 9 years ago
- ☆22Updated 8 years ago
- Shellcode injection using debugging APIs☆19Updated 12 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆27Updated 4 years ago
- ☆13Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- Shellcode tracer☆15Updated 9 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 12 years ago
- PowerShell script to bypass UAC using DCCW☆19Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- ☆10Updated 7 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- random python stuff☆26Updated 10 years ago