Location:
Search - linux rootkit
Search list
Description: Knark is a kernel-based rootkit for Linux 2.2. 使用此工具可以获得root权限
-Knark is a kernel-based rootkit for Linux 2.2. Use of this tool can root
Platform: |
Size: 19206 |
Author: 夏洪他 |
Hits:
Description: Linux 下 的 rootkit 攻击,利用rootkit可以让攻击者用来隐藏自己的踪迹和保留root访问权限。-under Linux rootkit attacks, use rootkit could allow an attacker to hide their trail and retain root permissions.
Platform: |
Size: 324115 |
Author: Joe Zhao |
Hits:
Description: linux中经典的rootkit的检测工具 功能超强 可以查杀上百种rootkit
Platform: |
Size: 37791 |
Author: 高强 |
Hits:
Description: adore linux rootkit , 版本 0.4。2, 原理:通过lkm实现修改内核,做到文件等的隐藏,运行稳定,值 得研究,特别是其中的思想-adore, version 0.4. 2, Principle : lkm achieve change kernel, so the hidden documents and stable operation, worthy of study, especially the thinking
Platform: |
Size: 15237 |
Author: bei |
Hits:
Description: adore linux rootkit , 版本 0.4。2, 原理:通过lkm实现修改内核,做到文件等的隐藏,运行稳定,值 得研究,特别是其中的思想-adore, version 0.4. 2, Principle : lkm achieve change kernel, so the hidden documents and stable operation, worthy of study, especially the thinking
Platform: |
Size: 15360 |
Author: bei |
Hits:
Description: Knark is a kernel-based rootkit for Linux 2.2. 使用此工具可以获得root权限
-Knark is a kernel-based rootkit for Linux 2.2. Use of this tool can root
Platform: |
Size: 18432 |
Author: 夏洪他 |
Hits:
Description: Linux 下 的 rootkit 攻击,利用rootkit可以让攻击者用来隐藏自己的踪迹和保留root访问权限。-under Linux rootkit attacks, use rootkit could allow an attacker to hide their trail and retain root permissions.
Platform: |
Size: 323584 |
Author: Joe Zhao |
Hits:
Description: 键盘的IDT hook范例,学习rootkit的好教程!-keyboard hook IDT example, a good learning rootkit Guide!
Platform: |
Size: 145408 |
Author: luocong |
Hits:
Description: linux中经典的rootkit的检测工具 功能超强 可以查杀上百种rootkit-linux in classic rootkit detection tools can be powerful killing hundreds of rootkit
Platform: |
Size: 37888 |
Author: 高强 |
Hits:
Description: 在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.-rootkit for linux
Platform: |
Size: 269312 |
Author: kkk |
Hits:
Description: HIDS入侵检测系统 OSSEC源代码,跨平台,支持防火墙联动,文件完整性检测,rootkit检测-OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS). It has a powerful correlation and analysis engine, integrating log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response.
It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows
Platform: |
Size: 728064 |
Author: 无名 |
Hits:
Description: \item{SucKIT} Oct 13, 2005 (2.2.x & 2.4.x kernels)
http://packetstormsecurity.org/files/40690/suckit2priv.tar.gz
http://packetstormsecurity.org/files/26371/sk-1.3a.tar.gz
http://needleseek.msra.cn/result.aspx?query=SucKIT
1. SucKIT ( see[ SUKT01]) is an example of rootkit which uses /dev/kmem to access kernel and then changing system_call code, not touching original syscall table.
2. SucKIT is a root-kit presented in Phrack issue 58, article 0x07 (" Linux on-the-fly kernel patching without LKM", by sd & devik).
3. Some research reports that SucKIT is a widely-known ( published in Phrack) kernel-level-rootkit.
4. Some Holidays Just SuckIt was a well-known fact that you did not bother Hangover on one particular day of the year.
Platform: |
Size: 465920 |
Author: fefafefa |
Hits:
Description: Linux Rootkit, be careful with this! :-)-Linux Rootkit, be careful with this! :-)
Platform: |
Size: 5120 |
Author: fefafefa |
Hits:
Description: linux下的最新rootkit,用户层的,使用的是2.6.*下的ld-preload,在多个版本下面测试可用.-The latest rootkits under linux, the user layer, using the 2.6* ld-preload, available in multiple versions of the following tests.
Platform: |
Size: 10240 |
Author: zzaaqqss |
Hits:
Description: suturesu - linux rootkit
Platform: |
Size: 20480 |
Author: swankvx |
Hits:
Description: This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.-This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.
Platform: |
Size: 1666048 |
Author: sukumi |
Hits:
Description: mnps是一个可以隐藏程序、文件、自身模块的Linuxrootkit-mnps is a linux rootkit to hide processes ,files and itself.
Platform: |
Size: 11264 |
Author: zhaoxiaocan |
Hits:
Description: 一款rootkit工具,Linux平台下使用,可实现文件、进程、网络、模块的隐藏(A rootkit tool, under the Linux platform, can be used to hide files, processes, networks and modules.)
Platform: |
Size: 5120 |
Author: sxm0403 |
Hits: