Linux Rootkit Scanner
☆89Jan 24, 2022Updated 4 years ago
Alternatives and similar repositories for kjackal
Users that are interested in kjackal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆44Mar 18, 2015Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆140Mar 14, 2018Updated 8 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kernel-Mode Rootkit Hunter☆375Nov 13, 2021Updated 4 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- rootkit sample code of my tutorials on Freebuf.com☆17Jul 27, 2016Updated 9 years ago
- This is a linux rootkit using many of the techniques described on☆166Oct 22, 2019Updated 6 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆12Feb 19, 2017Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 10 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆677Nov 21, 2017Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- 一个微型的操作系统☆12Nov 10, 2021Updated 4 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- A fully featured malware scanner for Linux desktops and servers.☆70May 18, 2022Updated 3 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆978Dec 11, 2020Updated 5 years ago
- C++ wrapper for capstone (x86 only)☆15Jul 27, 2017Updated 8 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 12 years ago
- linux rootkit adapted for 2.6 and 3.x☆222Dec 30, 2015Updated 10 years ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Mirror of users section of rootkit.com☆303Oct 5, 2016Updated 9 years ago
- Sample Rootkit for Linux☆404Jul 29, 2024Updated last year
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Aug 14, 2018Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago