MatheuZSecurity / RootkitLinks
Collection of codes focused on Linux rootkits
☆195Updated 3 months ago
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- ☆164Updated 11 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆364Updated 5 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆177Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- Windows rootkit designed to work with BYOVD exploits☆214Updated last year
- Offensive Lua.☆221Updated 2 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆112Updated 2 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- ☆105Updated last year
- ☆72Updated last year
- ☆163Updated 7 months ago
- Generate backdoored RSA keys using SETUP☆230Updated 2 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆113Updated 3 years ago
- Payload encoding utility to effectively lower payload entropy.☆123Updated 9 months ago
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆164Updated 10 months ago
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- Basic reverse shell in C using socket() with complete explanation☆69Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated this week
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆85Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- ☆156Updated 9 months ago