unix-thrust / beurkLinks
BEURK Experimental Unix RootKit
☆382Updated 8 years ago
Alternatives and similar repositories for beurk
Users that are interested in beurk are comparing it to the libraries listed below
Sorting:
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆786Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 11 months ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- LibZeroEvil & the Research Rootkit project.☆593Updated 3 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆267Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆691Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Sample Rootkit for Linux☆399Updated 10 months ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆325Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- Script to execute in memory a sequence of opcodes☆411Updated 11 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server