Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection.
☆808Mar 7, 2024Updated last year
Alternatives and similar repositories for azazel
Users that are interested in azazel are comparing it to the libraries listed below
Sorting:
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Dec 15, 2012Updated 13 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆123Jul 14, 2020Updated 5 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆674Nov 21, 2017Updated 8 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆504Oct 8, 2017Updated 8 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Jul 29, 2016Updated 9 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 7 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- This is the list of all rootkits found so far on github and other sites.☆1,427Aug 29, 2025Updated 6 months ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,435Oct 30, 2023Updated 2 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Apr 13, 2017Updated 8 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,321Sep 1, 2021Updated 4 years ago
- Post Exploitation Collection☆1,569May 1, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- Implementation of the SMM rootkit "The Watcher"☆132Mar 16, 2022Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,546Aug 2, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- linux rootkit adapted for 2.6 and 3.x☆220Dec 30, 2015Updated 10 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago