R3x / linux-rootkits
A collection of Linux kernel rootkits found across the internet taken and put together
☆73Updated 2 years ago
Alternatives and similar repositories for linux-rootkits:
Users that are interested in linux-rootkits are comparing it to the libraries listed below
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆62Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆71Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆196Updated last week
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆64Updated 2 years ago
- ☆157Updated 3 years ago
- Kernel Exploits☆247Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 6 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 10 months ago
- Windows Kernel Programming☆124Updated 4 years ago
- Dectect syscall hooking using eBPF☆145Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆196Updated 2 years ago
- ☆77Updated 4 months ago
- Reverse engineering software using a full system simulator☆179Updated this week
- bdvl☆112Updated 2 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆159Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆242Updated last year
- In line function hooking LKM rootkit☆51Updated 4 years ago
- Unofficial Common Log File System (CLFS) Documentation☆169Updated 3 years ago
- A utility to fix intentionally corrupted UPX packed files.☆82Updated last year
- ☆100Updated 2 years ago
- ☆101Updated 4 months ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Code injection from Linux kernel to a process☆19Updated last year
- A collection of curated resources and CVEs I use for research.☆104Updated 3 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆87Updated last year
- Fileless persistence, attacks and anti-forensic capabilties.☆90Updated 6 years ago
- ☆90Updated 4 years ago