An educational Linux Kernel Rootkit
☆33Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for brootus
Users that are interested in brootus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 11 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 9 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 3 months ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- My little precious collection of Linux 4.x kernel rootkits☆29Jul 27, 2024Updated last year
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 12 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Dec 15, 2012Updated 13 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆678Nov 21, 2017Updated 8 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- ☆20Mar 3, 2016Updated 10 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Moved to https://codeberg.org/DNS-OARC/bad-packets☆20Feb 4, 2026Updated 3 months ago
- Fresh is a Qt extension library. It provide many useful classes / widgets.☆23Jun 25, 2019Updated 6 years ago
- Redirecting File System☆26May 27, 2017Updated 8 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆22Jun 21, 2019Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago