croemheld / lkm-rootkitLinks
A LKM rootkit for most newer kernel versions.
☆180Updated 8 years ago
Alternatives and similar repositories for lkm-rootkit
Users that are interested in lkm-rootkit are comparing it to the libraries listed below
Sorting:
- Linux based inter-process code injection without ptrace(2)☆255Updated 8 years ago
- linux rootkit adapted for 2.6 and 3.x☆217Updated 9 years ago
- a summary of linux rootkits published on GitHub☆186Updated 5 years ago
- Example of hooking a linux systemcall☆63Updated 8 years ago
- Code for my 0x00sec.org posts☆330Updated 5 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆182Updated 13 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- Injects code into ELF executables post-build☆237Updated last year
- linux elf injector for x86 x86_64 arm arm64☆344Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Linux Kernel hooking engine (x86)☆384Updated 2 months ago
- Devestating and awesome Linux X86_64 ELF Virus☆234Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆91Updated 3 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆149Updated 9 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆388Updated 2 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆72Updated 8 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Updated 5 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- ☆286Updated 5 years ago
- Linux Rootkit Scanner☆87Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Hide processes as a normal user in Linux.☆260Updated last year
- linux rootkit☆162Updated 7 years ago
- ☆310Updated 2 years ago
- writings on anti-reverse engineering.☆289Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Updated 9 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago