Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.
☆119May 18, 2016Updated 9 years ago
Alternatives and similar repositories for cub3
Users that are interested in cub3 are comparing it to the libraries listed below
Sorting:
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆56May 23, 2016Updated 9 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,121Aug 2, 2019Updated 6 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- sudo heap overflow to LPE, in Go☆16Feb 9, 2021Updated 5 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆487Sep 28, 2016Updated 9 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 10 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- ☆63Nov 15, 2016Updated 9 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago