UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (+216.13%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+2238.71%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+403.23%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (+90.32%)
ebpfkit-monitorebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits
Stars: ✭ 80 (+158.06%)
S6 pcie microblazePCI Express DIY hacking toolkit for Xilinx SP605
Stars: ✭ 301 (+870.97%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+1441.94%)
linux kernel wikilinux内核学习资料:200+经典内核文章,100+内核论文,50+内核项目,500+内核面试题,80+内核视频
Stars: ✭ 1,653 (+5232.26%)
superhideExample of hooking a linux systemcall
Stars: ✭ 48 (+54.84%)
SutekhAn example rootkit that gives a userland process root permissions
Stars: ✭ 62 (+100%)
ebpfkitebpfkit is a rootkit powered by eBPF
Stars: ✭ 472 (+1422.58%)
WebshellWebshell && Backdoor Collection
Stars: ✭ 1,056 (+3306.45%)
Linux Kernel Module CheatThe perfect emulation setup to study and develop the Linux kernel v5.4.3, kernel modules, QEMU, gem5 and x86_64, ARMv7 and ARMv8 userland and baremetal assembly, ANSI C, C++ and POSIX. GDB step debug and KGDB just work. Powered by Buildroot and crosstool-NG. Highly automated. Thoroughly documented. Automated tests. "Tested" in an Ubuntu 19.10 ho…
Stars: ✭ 2,748 (+8764.52%)
devheartListen to Tux's heartbeat with this awesome Linux Kernel Module ❤️
Stars: ✭ 58 (+87.1%)
lkm-sandboxCollection of Linux Kernel Modules and PoC to discover, learn and practice Linux Kernel Development
Stars: ✭ 36 (+16.13%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+180.65%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+1838.71%)
kernel pendulum sdm845Pendulum Kernel (old Rebirth) based on LE.UM.3.2.2.r1.1 CAF with google-common merged in for Xiaomi Poco F1 and Mi 8 with LTO, CFI and SCS enabled.
Stars: ✭ 9 (-70.97%)
RSB-FrameworkWindows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (+41.94%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+854.84%)
rkduckLinux v4.x.x Rootkit
Stars: ✭ 83 (+167.74%)
proteccLinux kernel module to fight against police terror
Stars: ✭ 25 (-19.35%)
novabootA tool that automates booting of operating systems on target hardware or in qemu
Stars: ✭ 32 (+3.23%)
naticknatickOS - A minimal, lightweight, research Linux Distribution
Stars: ✭ 33 (+6.45%)
wingkalabsWingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para realizar entrenamientos de seguridad, probar herramientas de seguridad y practicar técnicas comunes de pruebas de penetración.
Stars: ✭ 16 (-48.39%)
kbdyschA collection of user-space Linux kernel specific guided fuzzers based on LKL
Stars: ✭ 62 (+100%)
shellstackA PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.
Stars: ✭ 109 (+251.61%)
disctopia-c2Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+596.77%)
nrf24nrf24l01 linux device driver
Stars: ✭ 20 (-35.48%)
drop-tcp-sockThis module allows one to kill TCP sockets (including TIME-WAIT state).
Stars: ✭ 58 (+87.1%)
android kernel xiaomi whyred🐧 Linux kernel sources for Redmi Note 5 Pro/AI (whyred) • https://telegra.ph/Rad-Kernel-Sources-whyred-09-04
Stars: ✭ 31 (+0%)
rtw88-usbrtw88 family usb driver for linux rtl8723du rtl8822bu rtl8821cu rtl8822cu
Stars: ✭ 40 (+29.03%)
awesome-gnu-linux-gamingA curated list of awesome GNU/Linux tips & tricks, games, tools, and resources - Mirrored from: https://gitlab.com/linuxcafefederation/awesome-gnu-linux-gaming.git
Stars: ✭ 135 (+335.48%)
NativePayload ARPC# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)
Stars: ✭ 44 (+41.94%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+883.87%)
virtblkiosimVirtual Linux block device driver for simulating and performing I/O.
Stars: ✭ 30 (-3.23%)
bpfbox🐝 BPFBox 📦 Exploring process confinement in eBPF
Stars: ✭ 93 (+200%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+709.68%)
LinuxKernelLearnLearn Linux Kernel Step by Step, including the Modules, FS, Device Driver etc. --- Linux内核学习,包括Linux各模块,文件系统,设备驱动文件等。
Stars: ✭ 37 (+19.35%)
Virtual RealityStealthy backdoor for Windows operating systems
Stars: ✭ 235 (+658.06%)
portablebpfYou came here so you could have a base code to serve you as an example on how to develop a BPF application, compatible to BCC and/or LIBBPF, specially LIBBPF, having the userland part made in C or PYTHON.
Stars: ✭ 32 (+3.23%)
Nativepayload dnsC# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses
Stars: ✭ 228 (+635.48%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (+580.65%)
lustre-releaseMirror of official Lustre development repository http://git.whamcloud.com/
Stars: ✭ 35 (+12.9%)
CanisrufusA stealthy Python based Windows backdoor that uses Github as a command and control server
Stars: ✭ 207 (+567.74%)
Webshell入侵分析时发现的Webshell后门
Stars: ✭ 201 (+548.39%)
rpi3-xenomaiXenomai 3 for Raspberry Pi 3
Stars: ✭ 23 (-25.81%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+2187.1%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (+529.03%)