A Linux LD_PRELOAD based userland rootkit that hides files, monitors outgoing network connections, hides strings, hides processes, and more.
rkit
hooks several functions in order to hide itself, and avoid being detected. rkit
comes with an anti rootkit feature that detects if
functions have already been hooked before the rootkit is properly initialized. rkit
also checks for byte-patch hooking.
- Anti VM
- File hiding
- Port blocking
- String hiding
- Reverse shell
- Ptrace detection
- Monitoring TCP connections
- Anti rootkit & hooking detection
- read
- open
- send
- write
- fgets
- fopen
- openat
- readdir
- connect
- fopen64
- C
To compile rkit
, simply execute the following command:
./build.sh
- The configuration file can be located in
src/config.h
.
export LD_PRELOAD=$PWD/rkit.so
Usage of this rootkit for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
https://github.com/0x80000000