Linux kernel modules developed by me for learning purposes
☆19Jan 16, 2013Updated 13 years ago
Alternatives and similar repositories for lkms
Users that are interested in lkms are comparing it to the libraries listed below
Sorting:
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- A dark theme for WinDBG.☆35Jul 9, 2014Updated 11 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Reference material for libbeauty☆25Aug 6, 2022Updated 3 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Aug 28, 2018Updated 7 years ago
- Run executables from the Windows registry☆15Jul 23, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago