ivyl / rootkit
Sample Rootkit for Linux
☆389Updated last month
Related projects: ⓘ
- LibZeroEvil & the Research Rootkit project.☆587Updated 2 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆771Updated 6 months ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆935Updated 3 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆777Updated 5 months ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆635Updated 6 years ago
- Script to execute in memory a sequence of opcodes☆406Updated 10 years ago
- BEURK Experimental Unix RootKit☆362Updated 7 years ago
- ☆202Updated this week
- linux rootkit adapted for 2.6 and 3.x☆202Updated 8 years ago
- My proof-of-concept exploits for the Linux kernel☆1,441Updated 2 years ago
- A shellcode writing toolkit☆659Updated 2 years ago
- A python reverse shell that uses DNS as the c2 channel☆497Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 4 years ago
- A tool to help you write binary exploits☆603Updated 5 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆322Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆721Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆485Updated 2 years ago
- PoC for Dirty COW (CVE-2016-5195)☆490Updated 2 years ago
- HORSEPILL rootkit PoC☆221Updated 8 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Updated 7 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆551Updated 7 years ago
- Win32k LPE vulnerability used in APT attack☆284Updated 6 years ago
- ☆652Updated this week
- a series tutorial for linux exploit development to newbie.☆552Updated 5 months ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 6 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆458Updated 7 years ago
- [unmaintained] Post-exploitation tool☆183Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆328Updated 8 years ago
- a summary of linux rootkits published on GitHub☆165Updated 4 years ago