Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one.

Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html

Features

  • Hijack linux system call table
  • Overriding open system call table with another one
  • You can use it to hijack any other system call table

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Hijack linux system calls rootkit

Hijack linux system calls rootkit Web Site

Other Useful Business Software
Streamline Azure Security with Palo Alto Networks VM-Series Icon
Streamline Azure Security with Palo Alto Networks VM-Series

Centrally manage physical and virtualized firewalls with Panorama

Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Learn more
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hijack linux system calls rootkit!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, Architects, Developers, Quality Engineers, Security Professionals, System Administrators

Programming Language

C

Registered

2012-12-14