This page contains various code proof of concepts used in the process of developing and researching the rootkit. There are blog articles to explain and help understand each of these elements.
Various systemtap & install scripts.
Hello world Kernel module
System call hijacking module
Key logging Kernel module
Part 2: Stealthy Key logging kernel module
Reverse shell invoked from Kernel module
maK_it: Linux Rootkit
More examples will be added as I progress through investigating the different functionality I would like to implement. I will also link to the finished product once it’s completed.