utoni / potdLinks
A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt and IoT devices.
☆30Updated 5 years ago
Alternatives and similar repositories for potd
Users that are interested in potd are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated 2 years ago
 - ELF binary infector☆33Updated 14 years ago
 - Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
 - A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
 - A rootkit implemented as a linux kernel module☆17Updated 10 years ago
 - This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Updated 11 years ago
 - System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
 - relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
 - Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
 - A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
 - Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
 - runtime code injector for Linux☆27Updated 14 years ago
 - ☆47Updated 7 years ago
 - ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
 - trace local function calls like strace and ltrace☆70Updated 8 years ago
 - Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
 - LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
 - Linux Rootkit Scanner☆87Updated 3 years ago
 - simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
 - sample linux x86_64 ELF virus☆53Updated 7 years ago
 - source code audit tool☆48Updated 4 years ago
 - Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
 - The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
 - A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
 - JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
 - Anti live forensic linux LKM rootkit☆17Updated 8 years ago
 - ☆35Updated 13 years ago
 - A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
 - Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆116Updated 2 years ago
 - LKM Rootkit based on Diamorphine☆15Updated 7 years ago