Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
-
Updated
Jan 13, 2021 - C
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Exploit toolkit
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.
An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables"
Ransomware tooling for x84_64 Linux
A collection of Linux Malware Detection projects (research paper implementations) done by me.
LD_PRELOAD rootkit that hooks raw syscalls with zpoline
A linux malware that exploits .bashrc file on linux!
ELF binary virus capable of infecting position independent executables and libraries.
DedSec Rootrap is a Linux Hacking Framework and Remote Access Trojan builder meticulously crafted for controlling Linux machines.
Builder written in python which embeds an ELF into an executable which when ran uses gdb to execute the ELF into the memory of another process. This tool does not require elevated privileges. Both shared object and executable ELF's are supported.
nikhilh-20/ELFEN is Automated Linux Malware Analysis Sandbox, with ELFEN-in-Docker the ELFEN is ran inside docker (Docker in Docker)
Add a description, image, and links to the linux-malware topic page so that developers can more easily learn about it.
To associate your repository with the linux-malware topic, visit your repo's landing page and select "manage topics."