A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
☆135Sep 19, 2021Updated 4 years ago
Alternatives and similar repositories for Umbra
Users that are interested in Umbra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- bdvl☆117Feb 26, 2022Updated 4 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,956Apr 7, 2024Updated 2 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- ☆318May 16, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆53Sep 4, 2021Updated 4 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- A LKM rootkit for most newer kernel versions.☆178Sep 17, 2017Updated 8 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆51Jun 28, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- ☆124May 12, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆31Feb 4, 2026Updated 2 months ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,660Oct 19, 2023Updated 2 years ago
- TCP Port Redirection Utility☆768Jan 31, 2023Updated 3 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- Red-Team LKM☆633Dec 16, 2025Updated 4 months ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- awesome-linux-rootkits☆2,058Feb 15, 2026Updated 2 months ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆134Aug 8, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆359Jan 29, 2022Updated 4 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆51Jan 15, 2024Updated 2 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Aug 22, 2016Updated 9 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Aug 10, 2019Updated 6 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago