spiderpig1297 / kunkillableLinks
kunkillable is an LKM that makes userland processes unkillable.
☆15Updated 4 years ago
Alternatives and similar repositories for kunkillable
Users that are interested in kunkillable are comparing it to the libraries listed below
Sorting:
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- ☆48Updated 5 years ago
- ☆13Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Google Chrome Use After Free☆58Updated 3 years ago
- yet another hidden LKM hunter☆25Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆28Updated 6 years ago
- Code injection from Linux kernel to a process☆21Updated 2 years ago
- ☆28Updated 9 months ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- ☆14Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆18Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Updated 5 years ago
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- ☆37Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago