Skip to content

nik875/LD_PRELOAD_rootkit

Repository files navigation

Defensive LD_PRELOAD rootkit that conceals wazuh-agent and silently monitors unauthorized filesystem alterations from inside attacker-controlled processes. Main priority is stealth. Upon attempted access of rootkit files or /etc/ld.so.preload, "apoptosis" is triggered and the rootkit is cleanly deleted. It's more important to conceal the fact that we're using this strategy than fight red team; the incident reports should reveal what process triggered the Cytochrome C tripwire and help a human admin identify red team's persistence and C2.

Also includes an "epidermis" of shell scripts protecting "organs" (important binaries). Queries for wazuh are filtered out and simulated errors are delivered as needed. Installation is automatic based on the presence of the target organ in /usr/bin. .organ files (real binaries) can be called (e.g. run "apt.organ update" instead of "apt update") but are concealed by the rootkit from getdents64.

About

Defensive Linux rootkit via LD_PRELOAD library call interception. Focused on stealthy, non-disruptive monitoring of attacker behavior.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors