nisay759 / linux-rootkits
My little precious collection of Linux 4.x kernel rootkits
☆25Updated 6 months ago
Alternatives and similar repositories for linux-rootkits:
Users that are interested in linux-rootkits are comparing it to the libraries listed below
- Matryoshka - stacked LKM loader☆50Updated last year
- ☆27Updated 5 years ago
- ☆65Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- ☆16Updated 3 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- ☆33Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Rootkit Detector for UNIX☆62Updated last year
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Shellcode process injector☆27Updated 4 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆51Updated 7 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- Shim database persistence (Fin7 TTP)☆36Updated 4 years ago
- ☆49Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆71Updated 5 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆38Updated 9 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 6 years ago
- A library to facilitate the exploitation of padding oracle attacks☆14Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆84Updated last year
- Reverse shell and rootkit☆19Updated 7 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- ☆45Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 5 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago