txsniper / Rootkit-Arsenal
Rootkit Arsenal 2nd Source Code
☆14Updated 11 years ago
Alternatives and similar repositories for Rootkit-Arsenal
Users that are interested in Rootkit-Arsenal are comparing it to the libraries listed below
Sorting:
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆20Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago
- A Unix rootkit☆16Updated 4 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- A collection of anti disassembly techniques☆19Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- ☆22Updated 4 years ago
- AAC File Formats Fuzzing for Mobile Browsers☆9Updated 9 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 8 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆45Updated 6 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- ☆28Updated 6 months ago
- ☆33Updated 7 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- ☆14Updated 9 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Zerokit shared code☆16Updated 6 years ago
- ☆24Updated 3 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆24Updated 9 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆15Updated 7 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 13 years ago