Linux rootkit
Tested on:
Debian 9: 4.9.0-8-amd64
Debian 10: 4.19.0-8-amd64
Ubuntu 18.04.1 LTS: 4.15.0-38-generic
Kali Linux: 4.18.0-kali2-amd64
Centos 6.10: 2.6.32-754.6.3.el6.x86_64
Centos 7: 3.10.0-862.3.2.el7.x86_64
Centos 8: 4.18.0-147.5.1.el8_1.x86_64
Features:
Give root to unprivileged users
Hide files and directories
Hide processes
Hide himself
Hide TCP/UDP connections
Hidden boot persistence
File content tampering
Some obfuscation techniques
ICMP/UDP/TCP port-knocking backdoor
Full TTY/PTY shell with file transfer
Client to handle Reptile Shell
Shell connect back each X times (not default)
https://github.com/f0rb1dd3n/Reptile/
Private: @MalwareCloudBot
Магазин вредоносных ПО - @MalwareShopBot
Project @MalwareForum
Tested on:
Debian 9: 4.9.0-8-amd64
Debian 10: 4.19.0-8-amd64
Ubuntu 18.04.1 LTS: 4.15.0-38-generic
Kali Linux: 4.18.0-kali2-amd64
Centos 6.10: 2.6.32-754.6.3.el6.x86_64
Centos 7: 3.10.0-862.3.2.el7.x86_64
Centos 8: 4.18.0-147.5.1.el8_1.x86_64
Features:
Give root to unprivileged users
Hide files and directories
Hide processes
Hide himself
Hide TCP/UDP connections
Hidden boot persistence
File content tampering
Some obfuscation techniques
ICMP/UDP/TCP port-knocking backdoor
Full TTY/PTY shell with file transfer
Client to handle Reptile Shell
Shell connect back each X times (not default)
https://github.com/f0rb1dd3n/Reptile/
Private: @MalwareCloudBot
Магазин вредоносных ПО - @MalwareShopBot
Project @MalwareForum