kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
☆18Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for kfile-over-icmp
Users that are interested in kfile-over-icmp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- kunkillable is an LKM that makes userland processes unkillable.☆17Sep 26, 2020Updated 5 years ago
- ATA command sniffer for Linux☆20Dec 18, 2020Updated 5 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Minimal patch guard for linux kernel☆31Oct 15, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- ☆38Apr 15, 2025Updated last year
- Kernel mode to user mode so injection☆95Nov 6, 2020Updated 5 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆21Nov 29, 2024Updated last year
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆119Mar 27, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- C#的GUI五子棋大作业 包括禁手 AI 简单直播功能☆10Dec 14, 2018Updated 7 years ago
- PoC for CVE-2025-48384☆21Jul 9, 2025Updated 9 months ago
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Understanding some of the Anti-Reversing Techniques☆11Oct 6, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- How to create a setup for linux kernel debugging using buildroot☆43Nov 27, 2022Updated 3 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆65Apr 2, 2025Updated last year
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- Lightweight framework for modular, event-based JavaScript programming☆47Apr 22, 2023Updated 2 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Setup for linux kernel development (development, debugging automation and compiling)☆35Nov 30, 2022Updated 3 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆182Dec 15, 2012Updated 13 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆13Dec 26, 2024Updated last year
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Reproducible localhost based on NixOS☆16Feb 13, 2023Updated 3 years ago