Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.

Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html

Features

  • Hijack linux system call table
  • Overriding open system call table with another one
  • You can use it to hijack any other system call table

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Hijack linux system calls rootkit

Hijack linux system calls rootkit Web Site

Other Useful Business Software
Fully Managed MySQL, PostgreSQL, and SQL Server Icon
Fully Managed MySQL, PostgreSQL, and SQL Server

Automatic backups, patching, replication, and failover. Focus on your app, not your database.

Cloud SQL handles your database ops end to end, so you can focus on your app.
Try Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hijack linux system calls rootkit!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, Architects, Developers, Quality Engineers, Security Professionals, System Administrators

Programming Language

C

Registered

2012-12-14