Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.

Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html

Features

  • Hijack linux system call table
  • Overriding open system call table with another one
  • You can use it to hijack any other system call table

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Hijack linux system calls rootkit

Hijack linux system calls rootkit Web Site

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hijack linux system calls rootkit!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, System Administrators, Developers, Quality Engineers, Architects, Security Professionals

Programming Language

C

Registered

2012-12-14