gianlucaborello / libprocesshider
Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)
☆1,048Updated 5 years ago
Alternatives and similar repositories for libprocesshider:
Users that are interested in libprocesshider are comparing it to the libraries listed below
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆1,931Updated last year
- LKM Linux rootkit☆2,666Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- Simple reverse ICMP shell☆1,569Updated 6 years ago
- awesome-linux-rootkits☆1,791Updated last month
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,053Updated 4 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,249Updated 2 years ago
- A modern multiple reverse shell sessions manager written in go☆1,568Updated 2 months ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆796Updated 10 months ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,065Updated 2 years ago
- ☆1,336Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆465Updated 8 years ago
- Tiny SHell is an open-source UNIX backdoor.☆672Updated 11 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,501Updated this week
- Various kernel exploits☆768Updated 11 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,816Updated 10 months ago
- My proof-of-concept exploits for the Linux kernel☆1,463Updated 2 years ago
- Tool for injecting a shared object into a Linux process☆1,150Updated 3 years ago
- Dirty Cow exploit - CVE-2016-5195☆877Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆808Updated last year
- Hide processes as a normal user in Linux.☆254Updated 7 months ago
- Proof of concept for CVE-2019-0708☆1,179Updated 3 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,344Updated last year
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,179Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆648Updated 7 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,051Updated 2 years ago
- ebpfkit is a rootkit powered by eBPF☆780Updated 2 years ago
- Tool for extracting information from newly spawned processes☆746Updated 3 years ago