therealdreg / enyelkmView external linksLinks
LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.
☆87Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for enyelkm
Users that are interested in enyelkm are comparing it to the libraries listed below
Sorting:
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Nov 21, 2017Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- linux rootkit adapted for 2.6 and 3.x☆220Dec 30, 2015Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 2 weeks ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,253Jan 24, 2026Updated 3 weeks ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Mar 7, 2024Updated last year
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago