Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.
☆22Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for linux-rootkit
Users that are interested in linux-rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Experimental and sneaky backdoor patch for OpenSSH Portable.☆26Dec 21, 2021Updated 4 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- 编写一个简单的linux kernel rootkit☆24Aug 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- Reinforcement learning crypto trading bot☆10Oct 30, 2020Updated 5 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆64May 11, 2019Updated 6 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- A fork of openssh-portable for penetration testing purposes.☆11May 18, 2018Updated 7 years ago
- ☆12Sep 12, 2020Updated 5 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Feb 12, 2022Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆22Aug 9, 2022Updated 3 years ago
- Generate a locally viewable tradingview light report from jesse trade☆13Feb 24, 2023Updated 3 years ago
- This repository features Zyra, a crypto wallet tool that includes functionality for checking balances using mnemonic seed phrases. It all…☆13Aug 21, 2024Updated last year
- Block process execute kernel driver for Windows x64☆19Apr 7, 2016Updated 10 years ago
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆25Nov 20, 2025Updated 4 months ago
- A simple SHELL written in HTML and PHP can be used for performing RFI(Remote File Inclusion) & LFI(Local File Inclusion).☆18Aug 27, 2017Updated 8 years ago
- malware phylogeny for WSO web shell, Shellbot IRC bot and algorithm☆17May 24, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- build gdb static for all support arch☆26Apr 27, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Strategies to Gekko trading bot with backtests results and some useful tools.☆11May 5, 2018Updated 7 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 5 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- ☆64Mar 14, 2024Updated 2 years ago
- A fast implementation of Leiserchess AI for MIT 6.172`16 http://scrimmage.csail.mit.edu/☆12Dec 22, 2016Updated 9 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Disable SSL certificate verification for all binaries that use libssl☆48Jul 15, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago