tkmru / awesome-linux-rootkitsLinks
a summary of linux rootkits published on GitHub
☆179Updated 5 years ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆177Updated 12 years ago
- A LKM rootkit for most newer kernel versions.☆177Updated 7 years ago
- linux rootkit adapted for 2.6 and 3.x☆212Updated 9 years ago
- Code for my 0x00sec.org posts☆325Updated 4 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated last week
- Hide processes as a normal user in Linux.☆258Updated last year
- Linux v4.x.x Rootkit☆93Updated last year
- A ptrace POC by hooking SSH to reveal provided passwords☆186Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆672Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 5 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆45Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆890Updated 5 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- APT34/OILRIG leak☆233Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Example of hooking a linux systemcall☆63Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- List of real-world threats against endpoint protection software☆216Updated last week
- ☆33Updated 9 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆110Updated 6 years ago
- linux rootkit☆160Updated 7 years ago
- ☆197Updated 7 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- A collection of Linux kernel rootkits found across the internet taken and put together☆83Updated 2 years ago