spiderpig1297 / kfile-over-icmpLinks
kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
☆18Updated 5 years ago
Alternatives and similar repositories for kfile-over-icmp
Users that are interested in kfile-over-icmp are comparing it to the libraries listed below
Sorting:
- NT AUTHORITY\SYSTEM☆41Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
- ☆37Updated 7 months ago
- kunkillable is an LKM that makes userland processes unkillable.☆16Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- ☆28Updated 6 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 4 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Seven different DLL injection techniques in one single project.☆11Updated 5 years ago
- ☆29Updated last month
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- Antivirus Emulator Fingerprints☆29Updated 7 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- yet another hidden LKM hunter☆28Updated last month
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago