Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.

Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html

Features

  • Hijack linux system call table
  • Overriding open system call table with another one
  • You can use it to hijack any other system call table

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Hijack linux system calls rootkit

Hijack linux system calls rootkit Web Site

Other Useful Business Software
Auth for GenAI | Auth0 Icon
Auth for GenAI | Auth0

Enable AI agents to securely access tools, workflows, and data with fine-grained control and just a few lines of code.

Easily implement secure login experiences for AI Agents - from interactive chatbots to background workers with Auth0. Auth for GenAI is now available in Developer Preview
Try free now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hijack linux system calls rootkit!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, System Administrators, Developers, Quality Engineers, Architects, Security Professionals

Programming Language

C

Registered

2012-12-14