Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64
☆818Apr 7, 2024Updated last year
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- This is the list of all rootkits found so far on github and other sites.☆1,427Aug 29, 2025Updated 6 months ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- awesome-linux-rootkits☆2,032Feb 15, 2026Updated 2 weeks ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- My proof-of-concept exploits for the Linux kernel☆1,563Sep 11, 2025Updated 5 months ago
- a summary of linux rootkits published on GitHub☆192May 7, 2020Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆674Nov 21, 2017Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Kernel-Mode Rootkit Hunter☆376Nov 13, 2021Updated 4 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A rootkit for Android. Based on "Android platform based linux kernel rootkit" from Phrack Issue 68☆274Nov 4, 2023Updated 2 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 6 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Mar 7, 2024Updated last year
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆504Oct 8, 2017Updated 8 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆914Nov 7, 2023Updated 2 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆421May 18, 2018Updated 7 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆907Feb 26, 2021Updated 5 years ago
- Vulnerability Labs for security analysis☆1,172Mar 10, 2021Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- some vul☆789Apr 25, 2025Updated 10 months ago