Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).
☆50Jan 15, 2024Updated 2 years ago
Alternatives and similar repositories for Nuk3Gh0st
Users that are interested in Nuk3Gh0st are comparing it to the libraries listed below
Sorting:
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Load a DLL from memory☆35Nov 19, 2021Updated 4 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆132Aug 8, 2023Updated 2 years ago
- ELF shared libraries injection to a remote process.☆17Oct 1, 2022Updated 3 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Jan 31, 2022Updated 4 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆674Nov 21, 2017Updated 8 years ago
- Matryoshka - stacked LKM loader☆54Oct 8, 2023Updated 2 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated last year
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆972Dec 11, 2020Updated 5 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆63May 11, 2019Updated 6 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- SSH password logging via PAM☆30Jul 7, 2020Updated 5 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆29Feb 4, 2026Updated last month
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago