jermeyyy / rooty
Academic project of Linux rootkit made for Bachelor Engineering Thesis.
☆96Updated 6 months ago
Alternatives and similar repositories for rooty:
Users that are interested in rooty are comparing it to the libraries listed below
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆226Updated 2 months ago
- LD_PRELOAD rootkit☆128Updated 11 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- Code snippets for bare-metal malware development☆97Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- Kernel Exploits☆247Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆64Updated 2 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆242Updated last year
- bdvl☆112Updated 2 years ago
- GhostWriting Injection Technique.☆166Updated 6 years ago
- Elf binary infector written in Go.☆206Updated last month
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆453Updated 3 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆179Updated 3 years ago
- Linux kernel rootkit☆327Updated 2 weeks ago
- ☆129Updated last year
- ☆131Updated last year
- ☆157Updated 3 years ago
- Yet another variant of Process Hollowing☆376Updated 3 weeks ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆27Updated 4 years ago
- Detect strange memory regions and DLLs☆177Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆73Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆179Updated 3 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 5 months ago
- Matryoshka - stacked LKM loader☆50Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆72Updated 7 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆135Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆160Updated 2 months ago
- A simple implant showcasing modern C++☆104Updated 4 years ago