MatheuZSecurity / RootkitLinks
Collection of codes focused on Linux rootkits
☆185Updated last month
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 7 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆113Updated 5 months ago
- Linux Kernel Rootkit for modern kernels (6x)☆486Updated this week
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated last week
- ☆164Updated 8 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 11 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆102Updated 3 weeks ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆137Updated 3 months ago
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆86Updated 9 months ago
- ☆158Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 10 months ago
- ☆71Updated 9 months ago
- This is practice VM for malware development☆134Updated 2 weeks ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆107Updated 3 years ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆222Updated 7 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- RunPE implementation with multiple evasive techniques☆241Updated last month
- Tools for analyzing EDR agents☆269Updated last year
- ☆105Updated last year
- Payload encoding utility to effectively lower payload entropy.☆120Updated 7 months ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆137Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆75Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- ☆154Updated 6 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆257Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆300Updated last week
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago