diff options
author | 2025-04-17 08:21:29 +0530 | |
---|---|---|
committer | 2025-04-17 08:21:29 +0530 | |
commit | 7a709eb44a353929f97750268b7cfbe934b784a0 (patch) | |
tree | 55c9aea8de081c634f5dc53d802faf63e6d042b8 /README.md | |
parent | 9a53dbd03bfb9d1b1c76cef9a5a3f6fa051de396 (diff) | |
download | rootkit-master.tar.gz rootkit-master.tar.bz2 rootkit-master.zip |
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 21 |
1 files changed, 3 insertions, 18 deletions
@@ -1,16 +1,8 @@ # PID Hiding Kernel Module -**IMPORTANT: EDUCATIONAL PURPOSES ONLY** +**THIS CAN LEADS TO KERNEL PANIC AND KERNEL HANG** -This module demonstrates kernel-level process hiding techniques for security research and educational purposes only. Using this code to hide malicious processes is illegal and unethical. - -## Disclaimer - -This code is provided AS-IS with: - -- NO WARRANTY -- NO SUPPORT -- NO RECOMMENDATION FOR DEPLOYMENT +This module demonstrates kernel-level process hiding techniques. Using this code to hide processes. Implementation of kernel-level process hiding may: - Violate computer fraud laws @@ -31,17 +23,10 @@ sudo insmod pid_hider.ko hidden_pid=1234 sudo rmmod pid_hider ``` -## Legal Notice - -Use of this code on systems without explicit authorization may constitute a criminal offense under: -- Computer Fraud and Abuse Act (CFAA) -- EU Directive 2013/40/EU -- Various international cybercrime laws - ## Legitimate Alternatives For legitimate process management, consider: - Linux Control Groups (cgroups) - Container technologies (Docker, LXC) - Mandatory Access Control (SELinux, AppArmor) -- Process accounting and auditing tools
\ No newline at end of file +- Process accounting and auditing tools |