jermeyyy / rooty
Academic project of Linux rootkit made for Bachelor Engineering Thesis.
☆101Updated 8 months ago
Alternatives and similar repositories for rooty:
Users that are interested in rooty are comparing it to the libraries listed below
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆247Updated last year
- LD_PRELOAD rootkit☆131Updated last year
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆228Updated 4 months ago
- Linux kernel rootkit☆342Updated last month
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆123Updated 3 years ago
- Kernel Exploits☆251Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year
- Elf binary infector written in Go.☆208Updated 3 months ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆128Updated last year
- GhostWriting Injection Technique.☆170Updated 7 years ago
- bdvl☆113Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆73Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆84Updated last year
- Yet another variant of Process Hollowing☆389Updated 2 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- x86 malware emulator☆217Updated last month
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆176Updated last year
- Abusing exceptions for code execution.☆110Updated 2 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆27Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆69Updated 2 years ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆239Updated last year
- ☆268Updated 2 years ago
- Bootkit sample for firmware attack☆248Updated 4 months ago
- ☆131Updated last year
- A LKM rootkit for most newer kernel versions.☆174Updated 7 years ago
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- a summary of linux rootkits published on GitHub☆176Updated 4 years ago
- Files for the packer tutorial☆72Updated 4 years ago
- Packer/Protector for x86-64 ELF binaries on Linux☆147Updated 3 years ago