Simple LKM linux kernel rootkit (x86 / x86_64)
☆24Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for LilyOfTheValley
Users that are interested in LilyOfTheValley are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 11 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Dec 15, 2012Updated 13 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 11 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 10 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆51Jan 15, 2024Updated 2 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Jun 8, 2018Updated 7 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Jun 21, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆33Feb 23, 2020Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ye olde root shell for ye olde httpd☆44Apr 3, 2015Updated 11 years ago
- OpenCTI Add-On for Splunk☆14Jan 13, 2026Updated 3 months ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago