thalium / rkchkLinks
Rust Linux Kernel Module designed for LKM rootkit detection
☆54Updated 8 months ago
Alternatives and similar repositories for rkchk
Users that are interested in rkchk are comparing it to the libraries listed below
Sorting:
- Linpmem is a linux memory acquisition tool☆94Updated 5 months ago
- Attacking the cleanup_module function of a kernel module☆54Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- ☆83Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆132Updated 7 months ago
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆153Updated 3 months ago
- Payload encoding utility to effectively lower payload entropy.☆120Updated 7 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- eBPF hacks☆188Updated 11 months ago
- A simple Meterpreter stager written in Rust.☆43Updated last month
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated last week
- kubernetes rootkit☆34Updated last year
- Memory Obfuscation in Rust☆264Updated last month
- Collection of codes focused on Linux rootkits☆188Updated last month
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆98Updated 3 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ☆58Updated last year
- Linux rootkit for educational purposes☆33Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆329Updated 5 months ago
- eBPF Memory Dump Tool☆92Updated 3 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆75Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆123Updated 3 weeks ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Updated 10 months ago