awesome-linux-rootkits
☆2,063Feb 15, 2026Updated 2 months ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,313Apr 27, 2026Updated last week
- This is the list of all rootkits found so far on github and other sites.☆1,442Aug 29, 2025Updated 8 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,964Apr 7, 2024Updated 2 years ago
- Linux Kernel hooking engine (x86)☆392Oct 14, 2025Updated 6 months ago
- Red-Team LKM☆636Apr 20, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆820Apr 7, 2024Updated 2 years ago
- Linux Kernel Hacking☆757Apr 10, 2024Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆980Dec 11, 2020Updated 5 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 4 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,135Updated this week
- a summary of linux rootkits published on GitHub☆194May 7, 2020Updated 5 years ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,595Jul 13, 2020Updated 5 years ago
- awesome list of browser exploitation tutorials☆2,280Sep 18, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of links related to Linux kernel security and exploitation☆6,429Mar 7, 2026Updated last month
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,704Updated this week
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,126Aug 2, 2019Updated 6 years ago
- ebpfkit is a rootkit powered by eBPF☆846Feb 28, 2023Updated 3 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,533Apr 17, 2025Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,667Oct 19, 2023Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,094Feb 3, 2024Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,562Jul 8, 2025Updated 9 months ago
- Adversary Emulation Framework☆11,110Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated list of awesome privilege escalation☆1,544Mar 23, 2026Updated last month
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,325Feb 15, 2026Updated 2 months ago
- List of Awesome Advanced Windows Exploitation References☆1,560Jan 13, 2022Updated 4 years ago
- windows kernel security development☆2,064Sep 6, 2022Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆120Mar 27, 2026Updated last month
- Various kernel exploits☆805Mar 14, 2024Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on …☆5,808Apr 3, 2024Updated 2 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆678Nov 21, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆514Nov 21, 2020Updated 5 years ago
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- ☆2,187Apr 3, 2026Updated last month
- Converts PE into a shellcode☆2,760Aug 30, 2025Updated 8 months ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,756Jan 16, 2026Updated 3 months ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,443Jul 20, 2024Updated last year