Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.
Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
Features
- Hijack linux system call table
- Overriding open system call table with another one
- You can use it to hijack any other system call table
License
GNU General Public License version 3.0 (GPLv3)Follow Hijack linux system calls rootkit
Other Useful Business Software
Streamline Azure Security with Palo Alto Networks VM-Series
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Hijack linux system calls rootkit!