Skip to content

A small python script which can detect Linux Rootkits

License

Notifications You must be signed in to change notification settings

Tayhm/LRKDetect

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

LRKDetect - Linux Rootkit Detect

This is a small python script which can detect Linux Kernel Mode Rootkits.

It can detect hidden processes by checking if the PID is hidden from showing under /proc/, but the files in the PID's subdirectory are still accessible.

It can detect hidden kernel modules by checking if they hid from /proc/modules but not their subdirectory under /sys/module/.

If it hides from both locations, or does not hide at all, it will not be detected through this mechanism, but may still be detected because of hiding a PID.

There are other malicious things rootkits might do like hiding open ports, which will not be detected.

I tested it against Diamorphine, which hid itself and one process, and it was able to detect both.

Running the script

First, clone the repository. Second:

python3 scanner.py

The script will let you know if something malicious was found.

About

A small python script which can detect Linux Rootkits

Resources

License

Stars

Watchers

Forks

Languages