yaoyumeng / adore-ng
linux rootkit adapted for 2.6 and 3.x
☆208Updated 9 years ago
Alternatives and similar repositories for adore-ng:
Users that are interested in adore-ng are comparing it to the libraries listed below
- Kernel-Mode Rootkit Hunter☆366Updated 3 years ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- A LKM rootkit for most newer kernel versions.☆173Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Linux v4.x.x Rootkit☆89Updated 8 months ago
- Linux Rootkit Scanner☆87Updated 3 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆117Updated 8 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆650Updated 7 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆328Updated 7 years ago
- bdvl☆113Updated 3 years ago
- Sample Rootkit for Linux☆397Updated 7 months ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆169Updated 12 years ago
- linux rootkit☆159Updated 7 years ago
- a summary of linux rootkits published on GitHub☆172Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆255Updated 3 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆326Updated 2 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- ☆467Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆206Updated 7 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit☆224Updated 2 years ago
- ☆164Updated 6 years ago
- List of real-world threats against endpoint protection software☆215Updated 4 months ago
- ☆381Updated last year
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆410Updated 6 years ago
- Hide processes as a normal user in Linux.☆255Updated 8 months ago
- A tool to detect and crash Cuckoo Sandbox☆292Updated 8 months ago
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆228Updated 5 years ago