Skip to content
/ rkit Public

🕷️An LD_PRELOAD based userland rootkit.

Notifications You must be signed in to change notification settings

BAKMAH/rkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

rkit 🕷️

A Linux LD_PRELOAD based userland rootkit that hides files, monitors outgoing network connections, hides strings, hides processes, and more.


Description

rkit hooks several functions in order to hide itself, and avoid being detected. rkit comes with an anti rootkit feature that detects if functions have already been hooked before the rootkit is properly initialized. rkit also checks for byte-patch hooking.

Features

  • Anti VM
  • File hiding
  • Port blocking
  • String hiding
  • Reverse shell
  • Ptrace detection
  • Monitoring TCP connections
  • Anti rootkit & hooking detection

Hooked functions

  • read
  • open
  • send
  • write
  • fgets
  • fopen
  • openat
  • readdir
  • connect
  • fopen64

Built with

  • C

Getting started

Compiling

To compile rkit, simply execute the following command:

  • ./build.sh

Configure

  • The configuration file can be located in src/config.h.

Usage

  • export LD_PRELOAD=$PWD/rkit.so

Back matter

Legal disclaimer

Usage of this rootkit for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Credits

https://github.com/0x80000000

Contributions 🎉

All contributions are accepted, simply open an Issue / Pull request.

About

🕷️An LD_PRELOAD based userland rootkit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published