LinuxrootkitGitHub

ExperimentationwithLinuxkernelmodulestotryandlearnmoreabouthowthekernelworks.Ongoingseriesofblogpostsonrootkittechniquescanbefoundhere ...,AquickLKMrootkitthatexecutesareverseTCPnetcatshellwithrootprivileges.clinuxreverse-shelllinux-kernelnetcatlinux-kernel-modulelkmnetcat- ...,Diamorphine.DiamorphineisaLKMrootkitforLinuxKernels2.6.x/3.x/4.x/5.x/6.x(x86/x86_64andARM64).Features.Whenloaded,them...

xcelleratorlinux_kernel_hacking

Experimentation with Linux kernel modules to try and learn more about how the kernel works. Ongoing series of blog posts on rootkit techniques can be found here ...

lkm

A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges. c linux reverse-shell linux-kernel netcat linux-kernel-module lkm netcat- ...

Diamorphine

Diamorphine. Diamorphine is a LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64). Features. When loaded, the module starts invisible ...

nuruporootkit

Linux Rootkit. A simple Linux kernel rootkit written for fun, not evil. Functionality. The rootkit can do the following: Grant root privileges to a userland ...

Zhang1933linux

Zhang1933/linux-rootkit · Folders and files · Latest commit · History · Repository files navigation · Features: · Asciinema Demo · Compile · Local attacker:.

R3xlinux

A collection of Linux kernel rootkits found across the internet taken and put together, with a short report on how they work. The README's in each folder ...

linux

Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & reverse shell port, ...

milabsawesome-linux

bROOTus is a Linux kernel rootkit that comes as a single LKM (Loadable Kernel Module) and it is totally restricted to kernel 2.6.32.

carloslackKoviD

Provides reverse shell backdoors. Conceals processes from the proc file system. Handles child processes, newly created processes. Hides KauditD logs, syslogs, ...

Linux Rootkits Part 1

2020年8月25日 — “A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is ...