My little precious collection of Linux 4.x kernel rootkits
☆28Jul 27, 2024Updated last year
Alternatives and similar repositories for linux-rootkits
Users that are interested in linux-rootkits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- ☆22Jun 9, 2025Updated 9 months ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- One of the fastest binary format for JSON-like data.☆12Dec 13, 2021Updated 4 years ago
- ☆15Jun 27, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Ye olde root shell for ye olde httpd☆44Apr 3, 2015Updated 10 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- ☆26Mar 11, 2025Updated last year
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- ☆20Mar 3, 2016Updated 10 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆14Jul 3, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Moved to https://codeberg.org/DNS-OARC/bad-packets☆19Feb 4, 2026Updated last month
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- ☆12Updated this week
- Example implementations of each attribute available in Nunit2 unit Testing Framework using C# .NET.☆15Jun 1, 2018Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Python 3 script to dump/scrape/extract company employees from XING API☆39Feb 12, 2026Updated last month
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago