TripleCross
Rootkit
A Linux rootkit demonstrating the offensive capabilities of eBPF technology using various techniques such as backdoors, C2 channels and code injection.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
2k stars
39 watching
222 forks
Language: C
last commit: 11 months ago
Linked from 3 awesome lists
backdoorebpfkernellibbpfrootkitsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A rootkit powered by eBPF designed to demonstrate offensive security techniques and bypass kernel protections. | 766 |
| A Linux rootkit that hooks the system call table to hide files and processes. | 157 |
| A Windows kernel rootkit with anti-rootkit evasion features and keylogging capabilities. | 502 |
| A Linux rootkit designed to evade detection and maintain persistence on compromised systems | 947 |
| A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. | 685 |
| A tool designed to detect and protect against certain types of malicious eBPF bytecode | 125 |
| A Linux kernel module designed to create a stealthy backdoor and hide processes or users from system administrators. | 1,865 |
| Demonstrates security vulnerabilities in the Linux kernel's eBPF system | 556 |
| A toolchain to simplify building and running eBPF programs with CO-RE and WebAssembly support | 687 |
| A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience | 628 |
| A Linux rootkit adapted for 2.6 and 3.x kernel versions | 206 |
| A framework for creating XNU-based rootkits with capabilities such as process manipulation and system call hijacking. | 124 |
| A container repository for storing and sharing public web hacking techniques and tools. | 1,953 |
| A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |