Linux rootkit and detection examples
☆32Jan 3, 2016Updated 10 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Protect your docker container from the public internet☆12Sep 5, 2017Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41May 19, 2017Updated 8 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- ☆28Oct 30, 2016Updated 9 years ago