Linux rootkit for kernel 4.9.133
☆16Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for linux_rootkit
Users that are interested in linux_rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago
- ☆17Jun 26, 2025Updated 10 months ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- This is the repo for remote direct memory introspection.☆25Jun 21, 2023Updated 2 years ago
- ☆21Oct 31, 2025Updated 6 months ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Explore the universe of spaceflight news with Spaceflight News API and htmx.org☆14Mar 15, 2025Updated last year
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- simpleR1: A Simple Framework for Training R1-like Models☆30Aug 12, 2025Updated 9 months ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Lagrange interpolation polynomials in C++11☆10Mar 1, 2018Updated 8 years ago
- C#的GUI五子棋大作业 包括禁手 AI 简单直播功能☆10Dec 14, 2018Updated 7 years ago
- Flexible, high performance IMDB & disk hybrid database written in Go. Features a brand-new modernistic query language and deep schema va…☆13Apr 21, 2024Updated 2 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Jun 8, 2018Updated 7 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [On Going] The is the ultimate blogging site made with Django Rest and Svelte/Kit☆13Jul 14, 2023Updated 2 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- ☆15Mar 5, 2024Updated 2 years ago
- The CS2 Battle Discord Bot is your go-to solution for seamlessly organizing and enjoying 5v5 matches with your friends directly on your D…☆15May 11, 2025Updated last year
- Understanding some of the Anti-Reversing Techniques☆12Oct 6, 2019Updated 6 years ago
- Code for the post "Elliptic Curves as Python Objects" implementing elliptic curve point addition over rational numbers.☆21Jun 9, 2020Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆29Mar 30, 2019Updated 7 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Match3 game with PixiJS☆17Dec 1, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Nov 20, 2019Updated 6 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆12Nov 17, 2018Updated 7 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago