Recent Posts

Rootstealer – Trick To Inject Commands On Root Terminal

  Rootstealer is an example of a new assault using X11. This tool is used to detect if Linux users open a terminal with the origin and inject control with X11 lib. Rootstealer Installation # apt-get put in libX11-dev libxtst-dev # cd rootstealer/sendkeys; Edit document root stealer/cmd. Cfg and compose …

Read More »

Microsoft Research Detours Package

Detours have been utilized by several ISVs and can be employed by product groups at Microsoft. Detours are currently available under a typical open source license (MIT). This simplifies licensing for developers using Detours and enables the community to encourage Detours using open source applications and procedures. Detours is a …

Read More »

r0ak – Ring 0 Army Knife

Motivation The Windows kernel is a rich environment where countless drivers execute on a typical system, and where thousands of variables containing worldwide state are present. For advanced troubleshooting, IT specialists will typically use tools like the Windows Debugger (WinDbg), SysInternals Tools, or compose their own. Unfortunately, use of those …

Read More »

Powered by keepvid themefull earn money