Academic project of Linux rootkit made for Bachelor Engineering Thesis.
☆118Jul 29, 2024Updated last year
Alternatives and similar repositories for rooty
Users that are interested in rooty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆675Nov 21, 2017Updated 8 years ago
- awesome-linux-rootkits☆2,047Feb 15, 2026Updated last month
- Red-Team LKM☆636Dec 16, 2025Updated 3 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆266Dec 6, 2025Updated 3 months ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,283Mar 10, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux Kernel Hacking☆751Apr 10, 2024Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆976Dec 11, 2020Updated 5 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆98Aug 31, 2022Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Apr 11, 2022Updated 3 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- Kiddy - (linux) kernel identity spoofer☆16Mar 18, 2024Updated 2 years ago
- LERN GHIDRA☆94Aug 14, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Fork of LLVM for LTO pass plugins support.☆21Jun 28, 2025Updated 9 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- Example of an easy way to take cs notes☆11Mar 11, 2021Updated 5 years ago
- This is the list of all rootkits found so far on github and other sites.☆1,435Aug 29, 2025Updated 7 months ago
- Arsenal of modules to beacon postex☆98Mar 13, 2026Updated 2 weeks ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Jan 15, 2024Updated 2 years ago
- 简单的Linux远程控制☆20Jun 3, 2017Updated 8 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆182Dec 15, 2012Updated 13 years ago
- linux x86 and x86_64 got hook☆11Nov 14, 2019Updated 6 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Jun 8, 2020Updated 5 years ago
- LibZeroEvil & the Research Rootkit project.☆599Dec 1, 2021Updated 4 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,951Apr 7, 2024Updated last year
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- ☆14Dec 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Call Stack Spoofing for Rust☆212Jan 28, 2026Updated 2 months ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 6 months ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Jun 10, 2022Updated 3 years ago
- Matryoshka - stacked LKM loader☆54Oct 8, 2023Updated 2 years ago
- Linux Kernel hooking engine (x86)☆391Oct 14, 2025Updated 5 months ago