TripleCross
Rootkit
A Linux rootkit demonstrating the offensive capabilities of eBPF technology using various techniques such as backdoors, C2 channels and code injection.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
2k stars
39 watching
222 forks
Language: C
last commit: over 1 year ago
Linked from 3 awesome lists
backdoorebpfkernellibbpfrootkitsecurity
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A rootkit powered by eBPF designed to demonstrate offensive security techniques and bypass kernel protections. | 766 |
| | A Linux rootkit that hooks the system call table to hide files and processes. | 157 |
| | A Windows kernel rootkit with anti-rootkit evasion features and keylogging capabilities. | 502 |
| | A Linux rootkit designed to evade detection and maintain persistence on compromised systems | 947 |
| | A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. | 685 |
| | A tool designed to detect and protect against certain types of malicious eBPF bytecode | 125 |
| | A Linux kernel module designed to create a stealthy backdoor and hide processes or users from system administrators. | 1,865 |
| | Demonstrates security vulnerabilities in the Linux kernel's eBPF system | 556 |
| | A toolchain to simplify building and running eBPF programs with CO-RE and WebAssembly support | 687 |
| | A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience | 628 |
| | A Linux rootkit adapted for 2.6 and 3.x kernel versions | 206 |
| | A framework for creating XNU-based rootkits with capabilities such as process manipulation and system call hijacking. | 124 |
| | A container repository for storing and sharing public web hacking techniques and tools. | 1,953 |
| | A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| | A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |