tkmru / awesome-linux-rootkitsLinks
a summary of linux rootkits published on GitHub
☆192Updated 5 years ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- A LKM rootkit for most newer kernel versions.☆180Updated 8 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 5 months ago
- linux rootkit adapted for 2.6 and 3.x☆218Updated 10 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆117Updated last year
- Kernel Hacking study materials collection☆108Updated 9 years ago
- ☆200Updated 8 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆94Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆678Updated 6 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆892Updated 6 years ago
- Hide processes as a normal user in Linux.☆261Updated last year
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Updated 2 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- Exploitation and Mitigation Slides☆135Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆155Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Vulnerability examples.☆413Updated last week
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Updated 8 years ago
- ☆317Updated 3 years ago
- Search for code cave in all binaries☆284Updated 3 months ago
- List of real-world threats against endpoint protection software☆216Updated 2 months ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago