Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.
Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
Features
- Hijack linux system call table
- Overriding open system call table with another one
- You can use it to hijack any other system call table
License
GNU General Public License version 3.0 (GPLv3)Follow Hijack linux system calls rootkit
Other Useful Business Software
Secure File Transfer for Windows with Cerberus by Redwood
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Hijack linux system calls rootkit!