spiderpig1297 / kfile-over-icmp
kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
☆17Updated 4 years ago
Alternatives and similar repositories for kfile-over-icmp:
Users that are interested in kfile-over-icmp are comparing it to the libraries listed below
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- An x64 binary executing code that's not inside of it.☆16Updated 2 years ago
- Seven different DLL injection techniques in one single project.☆11Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆28Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- ☆27Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- ☆16Updated 3 years ago
- ☆24Updated last week
- Code injection from Linux kernel to a process☆20Updated last year
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Various shell code I have written☆17Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆24Updated 3 years ago
- really ?☆12Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- yet another hidden LKM hunter☆21Updated last year
- ☆24Updated 9 years ago