ivyl / rootkit
Sample Rootkit for Linux
☆397Updated 9 months ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆798Updated last year
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆783Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆653Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- linux rootkit adapted for 2.6 and 3.x☆209Updated 9 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆287Updated 7 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆325Updated 8 years ago
- A shellcode writing toolkit☆670Updated 3 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,470Updated 3 years ago
- [unmaintained] Post-exploitation tool☆185Updated 9 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆494Updated 7 years ago
- linux rootkit☆159Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆171Updated 12 years ago
- A LKM rootkit for most newer kernel versions.☆174Updated 7 years ago
- EternalRocks worm☆459Updated 7 years ago
- The tiny programs and scripts that don't deserve a project, but I still want to share.☆218Updated 5 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆468Updated 8 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆443Updated 3 weeks ago
- Code for my 0x00sec.org posts☆320Updated 4 years ago