m0nad / DiamorphineView external linksLinks
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
☆2,253Jan 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for Diamorphine
Users that are interested in Diamorphine are comparing it to the libraries listed below
Sorting:
- awesome-linux-rootkits☆2,021Jan 28, 2026Updated 2 weeks ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Nov 21, 2017Updated 8 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,937Apr 7, 2024Updated last year
- Red-Team LKM☆633Dec 16, 2025Updated last month
- This is the list of all rootkits found so far on github and other sites.☆1,422Aug 29, 2025Updated 5 months ago
- Linux Kernel Hacking☆748Apr 10, 2024Updated last year
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- LibZeroEvil & the Research Rootkit project.☆598Dec 1, 2021Updated 4 years ago
- BEURK Experimental Unix RootKit☆389Apr 28, 2017Updated 8 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,452Jul 8, 2025Updated 7 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆263Dec 6, 2025Updated 2 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,085Feb 4, 2026Updated last week
- Adversary Emulation Framework☆10,673Updated this week
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- A stealth-focused C2 designed by Linux users for Linux environments, with native support for Windows and Linux BOFs.☆1,685Updated this week
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Mar 7, 2024Updated last year
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,497Nov 15, 2023Updated 2 years ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,122Aug 2, 2019Updated 6 years ago
- A collection of links related to Linux kernel security and exploitation☆6,337Jan 26, 2026Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,503Apr 17, 2025Updated 9 months ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- Defeating Windows User Account Control☆7,350Jan 11, 2026Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- Converts PE into a shellcode☆2,734Aug 30, 2025Updated 5 months ago
- ebpfkit is a rootkit powered by eBPF☆831Feb 28, 2023Updated 2 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- generate CobaltStrike's cross-platform payload☆2,540Nov 20, 2023Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,063Feb 3, 2024Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- AV/EDR evasion via direct system calls.☆1,789Sep 3, 2022Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,422Jul 20, 2024Updated last year
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- Linux privilege escalation auditing tool☆6,389Updated this week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,899Jan 24, 2024Updated 2 years ago