An educational Linux Kernel Rootkit
☆33Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for brootus
Users that are interested in brootus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- ☆20Mar 3, 2016Updated 10 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Fresh is a Qt extension library. It provide many useful classes / widgets.☆23Jun 25, 2019Updated 6 years ago
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆22Jun 21, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Ultra fast, compact, Embedded Database for tabular and semistructured data.☆35Dec 13, 2021Updated 4 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- linux rootkit adapted for 2.6 and 3.x☆222Dec 30, 2015Updated 10 years ago