My little precious collection of Linux 4.x kernel rootkits
☆28Jul 27, 2024Updated last year
Alternatives and similar repositories for linux-rootkits
Users that are interested in linux-rootkits are comparing it to the libraries listed below
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- ☆14Jun 27, 2024Updated last year
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- ☆29Sep 4, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- ☆14Mar 19, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- One of the fastest binary format for JSON-like data.☆13Dec 13, 2021Updated 4 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Python 3 script to dump/scrape/extract company employees from XING API☆39Feb 12, 2026Updated 2 weeks ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆71Aug 1, 2023Updated 2 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated last month
- Ye olde root shell for ye olde httpd☆44Apr 3, 2015Updated 10 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated 11 months ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago