Rootkit Arsenal 2nd Source Code
☆15Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for Rootkit-Arsenal
Users that are interested in Rootkit-Arsenal are comparing it to the libraries listed below
Sorting:
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Apr 11, 2022Updated 3 years ago
- Swiss army knife for (web) security specialists.☆12Dec 13, 2017Updated 8 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- ☆20Jul 9, 2019Updated 6 years ago
- 🔭 Find Hack Clubs near you!☆10Apr 18, 2019Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- A command line interface for adding tasks to Todoist.☆16Dec 7, 2022Updated 3 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Twilio, Ionic Framework and Node.js – A Message & Call App☆24Oct 6, 2014Updated 11 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ☆54Feb 27, 2017Updated 9 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Apr 30, 2012Updated 13 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Set hardware breakpoints programmaticaly - for windows x86/64☆29Jul 2, 2019Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- The Email Privacy Tester☆91Feb 20, 2016Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- HTML Elements for IPFS.☆28Sep 28, 2017Updated 8 years ago
- ☆72Jan 27, 2014Updated 12 years ago
- GUI for monitoring cast-xmr☆10Apr 13, 2018Updated 7 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago