Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.
☆22Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for linux-rootkit
Users that are interested in linux-rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- A simple example of map_in_map usage in libbpf☆10Mar 18, 2020Updated 6 years ago
- Iot-vulhub 自建镜像版☆12May 1, 2022Updated 3 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Instrumented ARM kernel☆15Oct 16, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆63May 11, 2019Updated 6 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- A fork of openssh-portable for penetration testing purposes.☆11May 18, 2018Updated 7 years ago
- Optimizing data-intensive systems in disaggregated data centers☆13Jun 13, 2022Updated 3 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- ☆13Feb 12, 2022Updated 4 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- This repository features Zyra, a crypto wallet tool that includes functionality for checking balances using mnemonic seed phrases. It all…☆13Aug 21, 2024Updated last year
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆24Nov 20, 2025Updated 4 months ago
- malware phylogeny for WSO web shell, Shellbot IRC bot and algorithm☆17May 24, 2022Updated 3 years ago
- 课程资料wiki☆14Mar 3, 2026Updated 2 weeks ago
- My Collection of Scripts, snippets, aliases and other stuff related to mIRC☆16Nov 30, 2024Updated last year
- build gdb static for all support arch☆25Apr 27, 2022Updated 3 years ago
- ☆24Jun 24, 2025Updated 8 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Strategies to Gekko trading bot with backtests results and some useful tools.☆11May 5, 2018Updated 7 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 4 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- ☆64Mar 14, 2024Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago