BEURK Experimental Unix RootKit
☆390Apr 28, 2017Updated 8 years ago
Alternatives and similar repositories for beurk
Users that are interested in beurk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆974Dec 11, 2020Updated 5 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆807Mar 7, 2024Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆675Nov 21, 2017Updated 8 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- LibZeroEvil & the Research Rootkit project.☆599Dec 1, 2021Updated 4 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,277Mar 10, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 9 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago