therealdreg / enyelkm
LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.
☆85Updated last year
Alternatives and similar repositories for enyelkm:
Users that are interested in enyelkm are comparing it to the libraries listed below
- Linux Rootkit Scanner☆87Updated 3 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- Linux v4.x.x Rootkit☆88Updated 6 months ago
- Rootkit Detector for UNIX☆62Updated last year
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- ☆33Updated 9 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆74Updated 6 years ago
- ☆65Updated 8 years ago
- ☆113Updated 8 years ago
- linux rootkit☆157Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- POC and exploitation of vulnerabilities☆91Updated 2 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- A LKM rootkit for most newer kernel versions.☆172Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆213Updated 4 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- ☆93Updated 6 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆129Updated 6 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- ☆100Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 3 years ago