zizzu0 / LinuxKernelModules
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for LinuxKernelModules
- Code injection from Linux kernel to a process☆19Updated last year
- Binary exploitation by confusing the unwinder☆59Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆29Updated 7 months ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆36Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆45Updated 2 weeks ago
- ☆32Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆60Updated 2 years ago
- ☆25Updated last year
- Explore a live Linux kernel's memory using GDB☆113Updated 2 years ago
- LKRG bypass methods☆71Updated 4 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated 8 months ago
- Automated recovery of Linux kernel build configurations☆24Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆92Updated 7 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆14Updated 5 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆74Updated 2 months ago
- ☆59Updated this week
- ☆10Updated 7 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆17Updated 3 weeks ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆47Updated 3 weeks ago
- Linux kernel branches for confidential compute research☆16Updated 3 weeks ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆34Updated 10 months ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆25Updated 4 years ago
- A binary hardening system☆99Updated last year
- Kernel Read Write Execute☆85Updated 2 months ago
- Protocol Reverse Engineering Resources☆20Updated last year
- Binary Golf Library☆62Updated 3 years ago
- yet another hidden LKM hunter☆13Updated last year
- A system call interception tool☆53Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year