This page contains various code proof of concepts used in the process of developing and researching the rootkit. There are blog articles to explain and help understand each of these elements.

Various systemtap & install scripts.

Hello world Kernel module

System call hijacking module

Key logging Kernel module

Part 2: Stealthy Key logging kernel module

Reverse shell invoked from Kernel module

maK_it: Linux Rootkit

More examples will be added as I progress through investigating the different functionality I would like to implement. I will also link to the finished product once it’s completed.