unix-thrust / beurkLinks
BEURK Experimental Unix RootKit
☆384Updated 8 years ago
Alternatives and similar repositories for beurk
Users that are interested in beurk are comparing it to the libraries listed below
Sorting:
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆803Updated last year
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆663Updated 7 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆965Updated 4 years ago
- Script to execute in memory a sequence of opcodes☆413Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆492Updated 4 years ago
- A shellcode writing toolkit☆681Updated 3 months ago
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Sample Rootkit for Linux☆402Updated last year
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Updated 9 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Win32k LPE vulnerability used in APT attack☆289Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago
- Hide processes as a normal user in Linux.☆258Updated last year
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- linux rootkit☆161Updated 7 years ago
- Kernel-Mode Rootkit Hunter☆370Updated 3 years ago
- Code for my 0x00sec.org posts☆325Updated 5 years ago
- A python reverse shell that uses DNS as the c2 channel☆510Updated 9 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆658Updated last year