tkmru / awesome-linux-rootkitsLinks
a summary of linux rootkits published on GitHub
☆192Updated 5 years ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- A LKM rootkit for most newer kernel versions.☆180Updated 8 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 5 months ago
- linux rootkit adapted for 2.6 and 3.x☆220Updated 10 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆63Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆95Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆679Updated 6 years ago
- Hide processes as a normal user in Linux.☆261Updated last year
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Kernel Hacking study materials collection☆108Updated 9 years ago
- ☆200Updated 8 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆117Updated last year
- Linux v4.x.x Rootkit☆92Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆156Updated 2 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆892Updated 6 years ago
- Example of hooking a linux systemcall☆63Updated 8 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Updated 2 years ago
- Search for code cave in all binaries☆284Updated 3 months ago
- linux rootkit☆162Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆153Updated 6 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Updated 8 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- Personal research and publication on malware families☆142Updated last year
- Vulnerability examples.☆413Updated 2 weeks ago
- Reversing list☆150Updated 2 years ago
- Kernel-Mode Rootkit Hunter☆376Updated 4 years ago