rootfoo / rootkit
Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes
☆61Updated 6 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- A LKM rootkit for most newer kernel versions.☆175Updated 7 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 8 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆69Updated 2 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- bdvl☆113Updated 3 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Reverse engineering challenges☆50Updated 5 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆172Updated 12 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- FLARE Kernel Shellcode Loader☆177Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Find strings in Go binaries☆53Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆99Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆73Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆29Updated 4 years ago
- Exploitation and Mitigation Slides☆128Updated 11 months ago