spiderpig1297 / kfile-over-icmp
kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.
☆17Updated 4 years ago
Alternatives and similar repositories for kfile-over-icmp:
Users that are interested in kfile-over-icmp are comparing it to the libraries listed below
- An x64 binary executing code that's not inside of it.☆16Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 5 months ago
- ☆11Updated 5 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- My little precious collection of Linux 4.x kernel rootkits☆25Updated 7 months ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- ☆12Updated last year
- ☆22Updated 4 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- ☆27Updated 5 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆22Updated last year
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago