yaoyumeng / adore-ng
linux rootkit adapted for 2.6 and 3.x
☆208Updated 9 years ago
Alternatives and similar repositories for adore-ng:
Users that are interested in adore-ng are comparing it to the libraries listed below
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- A LKM rootkit for most newer kernel versions.☆174Updated 7 years ago
- Linux Rootkit Scanner☆86Updated 3 years ago
- Kernel-Mode Rootkit Hunter☆363Updated 3 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆167Updated 12 years ago
- a summary of linux rootkits published on GitHub☆171Updated 4 years ago
- Linux v4.x.x Rootkit☆89Updated 7 months ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆325Updated 7 years ago
- ☆380Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆648Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- Sample Rootkit for Linux☆396Updated 7 months ago
- An attempt at Process Doppelgänging☆184Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 7 years ago
- x86 emulation and shellcode detection☆151Updated 11 months ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆205Updated 11 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- linux rootkit☆159Updated 7 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆254Updated 3 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆117Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆68Updated 5 years ago
- ☆164Updated 6 years ago
- Script to execute in memory a sequence of opcodes☆407Updated 10 years ago
- POC and exploitation of vulnerabilities☆91Updated 2 years ago