rootfoo / rootkitLinks
Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes
☆62Updated 6 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- A LKM rootkit for most newer kernel versions.☆178Updated 8 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆180Updated 12 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆233Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- a summary of linux rootkits published on GitHub☆182Updated 5 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆890Updated 5 years ago
- Injects code into ELF executables post-build☆234Updated last year
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Linux based inter-process code injection without ptrace(2)☆253Updated 8 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆85Updated 3 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last week
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Code for my 0x00sec.org posts☆327Updated 5 years ago
- linux rootkit☆162Updated 7 years ago
- Exploitation and Mitigation Slides☆132Updated last year
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- Reverse engineering challenges☆52Updated 6 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆137Updated 5 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆187Updated 8 years ago