Linux rootkit and detection examples
☆32Jan 3, 2016Updated 10 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Sample Rootkit for Linux☆404Jul 29, 2024Updated last year
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 9 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Windows Malware☆39Apr 17, 2013Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆70Feb 20, 2016Updated 10 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- Created by David Maloney via the GitHub Connector☆12Apr 14, 2026Updated 2 weeks ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆42May 19, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Set of Minimal C Utilities☆16Aug 21, 2015Updated 10 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- A docker image for ocserv☆11May 26, 2016Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago