Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.

Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html

Features

  • Hijack linux system call table
  • Overriding open system call table with another one
  • You can use it to hijack any other system call table

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Hijack linux system calls rootkit

Hijack linux system calls rootkit Web Site

Other Useful Business Software
Secure File Transfer for Windows with Cerberus by Redwood Icon
Secure File Transfer for Windows with Cerberus by Redwood

Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Try for Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hijack linux system calls rootkit!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, Architects, Developers, Quality Engineers, Security Professionals, System Administrators

Programming Language

C

Registered

2012-12-14