Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
☆980Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for vlany
Users that are interested in vlany are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119May 18, 2016Updated 9 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 9 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆809Mar 7, 2024Updated 2 years ago
- HORSEPILL rootkit PoC☆235Aug 5, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆678Nov 21, 2017Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,313Apr 27, 2026Updated last week
- This is the list of all rootkits found so far on github and other sites.☆1,442Aug 29, 2025Updated 8 months ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- awesome-linux-rootkits☆2,063Feb 15, 2026Updated 2 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆820Apr 7, 2024Updated 2 years ago
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆56May 23, 2016Updated 9 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- Sample Rootkit for Linux☆404Jul 29, 2024Updated last year
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆295Feb 9, 2017Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- My proof-of-concept exploits for the Linux kernel☆1,574Sep 11, 2025Updated 7 months ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,438Oct 30, 2023Updated 2 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool for injecting a shared object into a Linux process☆1,228Feb 23, 2022Updated 4 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆764Jan 28, 2019Updated 7 years ago
- A tool to dump the login password from the current linux user☆4,104Sep 5, 2025Updated 7 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kernel rootkit, that lives inside the Windows registry values data☆508Oct 8, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- ☆3,875Mar 14, 2024Updated 2 years ago