From 7a709eb44a353929f97750268b7cfbe934b784a0 Mon Sep 17 00:00:00 2001 From: Biswa Kalyan Bhuyan Date: Thu, 17 Apr 2025 08:21:29 +0530 Subject: updated stealth_launcher.c with just hides the process in trace level --- README.md | 21 +++------------------ 1 file changed, 3 insertions(+), 18 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index ca7a730..6f640b7 100644 --- a/README.md +++ b/README.md @@ -1,16 +1,8 @@ # PID Hiding Kernel Module -**IMPORTANT: EDUCATIONAL PURPOSES ONLY** +**THIS CAN LEADS TO KERNEL PANIC AND KERNEL HANG** -This module demonstrates kernel-level process hiding techniques for security research and educational purposes only. Using this code to hide malicious processes is illegal and unethical. - -## Disclaimer - -This code is provided AS-IS with: - -- NO WARRANTY -- NO SUPPORT -- NO RECOMMENDATION FOR DEPLOYMENT +This module demonstrates kernel-level process hiding techniques. Using this code to hide processes. Implementation of kernel-level process hiding may: - Violate computer fraud laws @@ -31,17 +23,10 @@ sudo insmod pid_hider.ko hidden_pid=1234 sudo rmmod pid_hider ``` -## Legal Notice - -Use of this code on systems without explicit authorization may constitute a criminal offense under: -- Computer Fraud and Abuse Act (CFAA) -- EU Directive 2013/40/EU -- Various international cybercrime laws - ## Legitimate Alternatives For legitimate process management, consider: - Linux Control Groups (cgroups) - Container technologies (Docker, LXC) - Mandatory Access Control (SELinux, AppArmor) -- Process accounting and auditing tools \ No newline at end of file +- Process accounting and auditing tools -- cgit v1.2.3-59-g8ed1b