nnedkov / swiss_army_rootkitView external linksLinks
☆34Jan 31, 2016Updated 10 years ago
Alternatives and similar repositories for swiss_army_rootkit
Users that are interested in swiss_army_rootkit are comparing it to the libraries listed below
Sorting:
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- ☆24Feb 21, 2016Updated 9 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 9 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 5 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆29Aug 18, 2014Updated 11 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Jun 21, 2016Updated 9 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago