tkmru / awesome-linux-rootkitsLinks
a summary of linux rootkits published on GitHub
☆192Updated 5 years ago
Alternatives and similar repositories for awesome-linux-rootkits
Users that are interested in awesome-linux-rootkits are comparing it to the libraries listed below
Sorting:
- A LKM rootkit for most newer kernel versions.☆180Updated 8 years ago
- linux rootkit adapted for 2.6 and 3.x☆219Updated 10 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 5 months ago
- fireELF - Fileless Linux Malware Framework☆679Updated 6 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- linux rootkit☆162Updated 7 years ago
- Hide processes as a normal user in Linux.☆261Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆156Updated 2 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆892Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- ☆200Updated 8 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆117Updated last year
- Exploitation and Mitigation Slides☆135Updated last year
- List of real-world threats against endpoint protection software☆216Updated last week
- A collection of Linux kernel rootkits found across the internet taken and put together☆95Updated 3 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Updated 2 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆110Updated 7 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Updated 8 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆192Updated last year
- APT34/OILRIG leak☆232Updated 6 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Search for code cave in all binaries☆284Updated 3 months ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆63Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆153Updated 6 years ago
- Kernel-Mode Rootkit Hunter☆376Updated 4 years ago