yaoyumeng / adore-ng
linux rootkit adapted for 2.6 and 3.x
☆209Updated 9 years ago
Alternatives and similar repositories for adore-ng:
Users that are interested in adore-ng are comparing it to the libraries listed below
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- A LKM rootkit for most newer kernel versions.☆174Updated 7 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆171Updated 12 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆783Updated last year
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Sample Rootkit for Linux☆397Updated 9 months ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Code for my 0x00sec.org posts☆320Updated 4 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆117Updated 8 years ago
- bdvl☆113Updated 3 years ago
- Linux Rootkit Scanner☆88Updated 3 years ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆653Updated 7 years ago
- ☆383Updated last year
- linux rootkit☆159Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- A tool to detect and crash Cuckoo Sandbox☆293Updated 9 months ago
- Proof of Concept exploit for CVE-2017-8570☆186Updated 7 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 8 years ago
- Hide processes as a normal user in Linux.☆257Updated 9 months ago
- An attempt at Process Doppelgänging☆182Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆494Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆228Updated 5 years ago
- Win32k LPE vulnerability used in APT attack☆287Updated 7 years ago
- a summary of linux rootkits published on GitHub☆176Updated 5 years ago