zionlion67 / rootkitLinks
Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.
☆11Updated 8 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 6 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆84Updated 6 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆27Updated 7 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- This project has been moved from a private repository☆26Updated 7 years ago
- ☆50Updated 8 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 7 years ago
- a C/C++ shellcode compiler based on llvm/clang☆37Updated 9 years ago
- ☆45Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 10 months ago
- ☆26Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- ☆26Updated 8 years ago
- ☆18Updated 7 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago