An educational Linux Kernel Rootkit
☆33Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for brootus
Users that are interested in brootus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 10 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- One of the fastest binary format for JSON-like data.☆12Dec 13, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Mar 24, 2016Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- My little precious collection of Linux 4.x kernel rootkits☆29Jul 27, 2024Updated last year
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 12 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Moved to https://codeberg.org/DNS-OARC/bad-packets☆19Feb 4, 2026Updated 2 months ago
- Algorithms and data structures in Rust☆12Sep 4, 2015Updated 10 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Ultra fast, compact, Embedded Database for tabular and semistructured data.☆35Dec 13, 2021Updated 4 years ago
- linux rootkit adapted for 2.6 and 3.x☆222Dec 30, 2015Updated 10 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Linux Rootkit Scanner☆89Jan 24, 2022Updated 4 years ago