m0nad / DiamorphineLinks
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
☆2,137Updated last year
Alternatives and similar repositories for Diamorphine
Users that are interested in Diamorphine are comparing it to the libraries listed below
Sorting:
- awesome-linux-rootkits☆1,937Updated 8 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆812Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,895Updated last year
- Linux Kernel Hacking☆736Updated last year
- This is the list of all rootkits found so far on github and other sites.☆1,373Updated 2 weeks ago
- Various kernel exploits☆792Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,181Updated 2 months ago
- A collection of links related to VMware escape exploits☆1,460Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,489Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆673Updated 6 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,407Updated last year
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,101Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆963Updated 4 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,817Updated 6 months ago
- Red-Team Linux kernel rootkit☆550Updated 2 weeks ago
- Linux/Windows post-exploitation framework made by linux user☆1,621Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,994Updated last week
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆663Updated 7 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,571Updated 11 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,157Updated 3 years ago
- AntiVirus Evasion Tool☆1,721Updated 4 months ago
- Simple reverse ICMP shell☆1,603Updated 7 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,937Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,657Updated 2 years ago
- ☆1,167Updated 8 years ago
- Code for my 0x00sec.org posts☆325Updated 5 years ago
- Converts PE into a shellcode☆2,645Updated 2 weeks ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,999Updated 2 weeks ago
- Linux privilege escalation auditing tool☆6,160Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,801Updated 11 years ago