spiderpig1297 / kfile-over-icmp
kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
☆16Updated 4 years ago
Alternatives and similar repositories for kfile-over-icmp:
Users that are interested in kfile-over-icmp are comparing it to the libraries listed below
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- An x64 binary executing code that's not inside of it.☆14Updated last year
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Rekall Memory Forensic Framework☆30Updated 5 years ago
- Non organized Cpp code files I used for my research on Windows☆18Updated 4 years ago
- ☆23Updated 8 years ago
- ☆16Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- kunkillable is an LKM that makes userland processes unkillable.☆15Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- ☆27Updated 5 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 4 years ago
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Various shell code I have written☆17Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆23Updated 4 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- Example for PagedOut!☆24Updated 5 years ago