Linux Kernel Hacking
☆750Apr 10, 2024Updated last year
Alternatives and similar repositories for linux_kernel_hacking
Users that are interested in linux_kernel_hacking are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,264Jan 24, 2026Updated last month
- awesome-linux-rootkits☆2,032Feb 15, 2026Updated 2 weeks ago
- Red-Team LKM☆637Dec 16, 2025Updated 2 months ago
- Linux Kernel hooking engine (x86)☆387Oct 14, 2025Updated 4 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,942Apr 7, 2024Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 2 months ago
- ebpfkit is a rootkit powered by eBPF☆837Feb 28, 2023Updated 3 years ago
- A collection of links related to Linux kernel security and exploitation☆6,353Jan 26, 2026Updated last month
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,279Jan 29, 2026Updated last month
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆757Jan 27, 2026Updated last month
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆684Jul 7, 2024Updated last year
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,686Feb 24, 2026Updated last week
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆132Aug 8, 2023Updated 2 years ago
- Linux kernel exploitation experiments☆385Jan 19, 2026Updated last month
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,662Oct 19, 2023Updated 2 years ago
- Matryoshka - stacked LKM loader☆54Oct 8, 2023Updated 2 years ago
- Using ftrace for function hooking in Linux kernel☆295Mar 21, 2021Updated 4 years ago
- LibZeroEvil & the Research Rootkit project.☆600Dec 1, 2021Updated 4 years ago
- LD_PRELOAD Rootkit☆305Apr 5, 2025Updated 10 months ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- Dectect syscall hooking using eBPF☆169Apr 28, 2023Updated 2 years ago
- Various kernel exploits☆803Mar 14, 2024Updated last year
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆36Oct 26, 2025Updated 4 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Sep 3, 2022Updated 3 years ago
- A LKM rootkit for most newer kernel versions.☆180Sep 17, 2017Updated 8 years ago
- AV/EDR evasion via direct system calls.☆1,793Sep 3, 2022Updated 3 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆579Jun 7, 2022Updated 3 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- Tracking CVEs for the linux Kernel☆750Apr 9, 2024Updated last year
- Android Kernel Exploitation☆638Feb 13, 2022Updated 4 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,577Jan 5, 2021Updated 5 years ago
- ☆2,168Feb 21, 2023Updated 3 years ago
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,689Updated this week