ait-aecid / caraxesLinks
Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.
☆45Updated 8 months ago
Alternatives and similar repositories for caraxes
Users that are interested in caraxes are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆304Updated 2 weeks ago
- Red-Team LKM☆631Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆427Updated last month
- Embed a payload inside a PNG file☆368Updated last year
- 🧞♂️ malware analysis☆38Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆506Updated 5 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,339Updated this week
- ☆51Updated 6 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆430Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- PoC for CVE-2024-48990☆106Updated last year
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆364Updated 5 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆336Updated 7 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆394Updated 10 months ago
- Because AV evasion should be easy.☆853Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆429Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆125Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- Public repository containing materials for various malware-related streams.☆48Updated last week
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 10 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆497Updated last week
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆444Updated last month