Rootkit Detector for UNIX
☆61Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for lsrootkit
Users that are interested in lsrootkit are comparing it to the libraries listed below
Sorting:
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Kernel-Mode Rootkit Hunter☆376Nov 13, 2021Updated 4 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Jun 24, 2019Updated 6 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated 2 months ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- An ELF parsing and manipulation library for Python☆74Oct 24, 2014Updated 11 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- A-Protect Anti Rootkit Tool☆56Jan 21, 2014Updated 12 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago