MatheuZSecurity / RootkitLinks
Collection of codes focused on Linux rootkits
☆148Updated 2 weeks ago
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆120Updated 4 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated this week
- ☆160Updated 5 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆82Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- ☆155Updated 2 months ago
- ☆68Updated 6 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆94Updated 3 weeks ago
- Windows rootkit designed to work with BYOVD exploits☆205Updated 7 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆204Updated 4 months ago
- Payload encoding utility to effectively lower payload entropy.☆119Updated 4 months ago
- ☆105Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆189Updated 7 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated 11 months ago
- ☆152Updated 4 months ago
- Tools for analyzing EDR agents☆241Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- In-Memory Rootkit For Linux and BSD☆78Updated 3 weeks ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆137Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆154Updated last month
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆116Updated 8 months ago
- A Mythic Agent written in PIC C.☆199Updated 6 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆148Updated 5 months ago
- ☆58Updated 4 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 8 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆102Updated 3 years ago