userpest / rootkit
simple rootkit for computer security class
☆14Updated 12 years ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- ☆14Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- lkm rootkit☆15Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 8 years ago
- A Unix rootkit☆16Updated 4 years ago
- LD_PRELOAD rootkit☆23Updated 10 years ago
- ☆23Updated 8 years ago
- fun rootkits stuff!☆17Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- An experimental rootkit for Android☆26Updated 11 years ago
- A toy Linux rootkit.☆13Updated 11 years ago
- ☆29Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Rootkit☆21Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- Fuzzing Framework☆10Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆7Updated 12 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago