-
yo @UnamSanctam
is that the r77 rootkit? if so, how does it work? i'm asking because i want to hide another executable alongside the miner. if it is the r77 rootkit, installing it twice isn't recomm…
-
![image](https://user-images.githubusercontent.com/414141/139701982-a9ce2327-9732-48e1-8d54-c11c09cf3a3f.png)
Knowledge and practice move patterns towards more favorable quadrants. But, complacen…
-
**Describe the bug**
HRDN-7230 checks if there is a malware scanner. One of the scanners suggested by Lynis is RKhunter. HRDN-7220 checks for the presence of a complier.
However, the as (assembly…
-
Quando terá hooking de syscalls no seu rootkit? Por ex hookar a getdents pra esconder diretórios, tcp4_seq_show e tcp6_seq_show pra esconder conexões e etc... Isso ai não está nem perto de ser um root…
ghost updated
7 months ago
-
# Feature request
### What new feature do you want?
Add RotaJakiro rootkit to ossec-rootkit pack
https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/
### How is this new feature use…
-
Hey,
could you add a rootkit so I can log onto your computer and run bitcoins? Thanks.
-
First of all thank you so much because of Rootkit article.
Regarding the tutorial you made, do you have a video explaining it step by step?
And can you please introduce me a good educational video?
…
-
-
how do i install the tor rootkit client on the target machine? I will gladly be ready to support the project in any way I can if you help me.
please answer me by mail - manuq4979@gmail.com or you c…
-
Could you make a list of all the rootkits used, external references (like linux kernel bugtracker links), and _possible risks_ as well as _system files overwritten/misused_?
It would make people like…