Linux Rootkit Scanner
☆88Jan 24, 2022Updated 4 years ago
Alternatives and similar repositories for kjackal
Users that are interested in kjackal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 8 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Kernel-Mode Rootkit Hunter☆375Nov 13, 2021Updated 4 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- rootkit sample code of my tutorials on Freebuf.com☆17Jul 27, 2016Updated 9 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Feb 19, 2017Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆675Nov 21, 2017Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- 一个微型的操作系统☆12Nov 10, 2021Updated 4 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69May 18, 2022Updated 3 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆974Dec 11, 2020Updated 5 years ago
- C++ wrapper for capstone (x86 only)☆15Jul 27, 2017Updated 8 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- linux rootkit adapted for 2.6 and 3.x☆222Dec 30, 2015Updated 10 years ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Mirror of users section of rootkit.com☆303Oct 5, 2016Updated 9 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Aug 14, 2018Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago