ivyl / rootkit
Sample Rootkit for Linux
☆397Updated 6 months ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆647Updated 7 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆794Updated 10 months ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- linux rootkit adapted for 2.6 and 3.x☆208Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- A python reverse shell that uses DNS as the c2 channel☆505Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Updated 7 years ago
- A shellcode writing toolkit☆661Updated 2 years ago
- just for fun ¯\_(ツ)_/¯☆261Updated 8 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- a summary of linux rootkits published on GitHub☆170Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- linux rootkit☆157Updated 7 years ago
- a series tutorial for linux exploit development to newbie.☆553Updated 10 months ago
- [unmaintained] Post-exploitation tool☆186Updated 9 years ago
- BEURK Experimental Unix RootKit☆380Updated 7 years ago
- ☆86Updated last year
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆228Updated 5 years ago
- This is the list of all rootkits found so far on github and other sites.☆1,295Updated last year
- PoC for Dirty COW (CVE-2016-5195)☆493Updated 2 years ago
- A LKM rootkit for most newer kernel versions.☆172Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆268Updated last year
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- ☆191Updated 7 years ago