Experimental program that detects files & directories hidden by Linux trojan/rootkits
-
Updated
Jan 11, 2024 - C
Experimental program that detects files & directories hidden by Linux trojan/rootkits
An Nginx module for persistent privileged malware
Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & reverse shell port, privilege escalation, cleans up logs and bash history during installation
Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, cleans up bash history and logs during installation
Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes
A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on how to compile) reverse shell provided in C.
Cerez 😈 userland LD_PRELOAD rootkit
-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.
ld_preload userland rootkit
Rootkit Detector for UNIX
Automated Cyber Offense
Add a description, image, and links to the rootkits topic page so that developers can more easily learn about it.
To associate your repository with the rootkits topic, visit your repo's landing page and select "manage topics."