xrw67 / bootkitLinks
Linux BootKit
☆32Updated 8 years ago
Alternatives and similar repositories for bootkit
Users that are interested in bootkit are comparing it to the libraries listed below
Sorting:
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Updated 9 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆111Updated 7 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Updated 5 years ago
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- This is a place to share my miscellaneous projects.☆116Updated 5 years ago
- Simple 32/64-bit PEs loader.☆138Updated 7 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 5 years ago
- ELF packer - x86_64☆74Updated 10 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- kernel pool windbg extension☆84Updated 10 years ago
- ☆50Updated 8 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆72Updated last year
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Obfuscates dynamic symbol table☆136Updated 6 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆85Updated 15 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆36Updated 4 years ago
- Static unpacker for FinSpy VM☆103Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 5 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- VT-based PCI device monitor (SPI)☆155Updated 5 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆125Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago
- Windows Kernel Programming☆133Updated 5 years ago