# PID Hiding Kernel Module **IMPORTANT: EDUCATIONAL PURPOSES ONLY** This module demonstrates kernel-level process hiding techniques for security research and educational purposes only. Using this code to hide malicious processes is illegal and unethical. ## Disclaimer This code is provided AS-IS with: - NO WARRANTY - NO SUPPORT - NO RECOMMENDATION FOR DEPLOYMENT Implementation of kernel-level process hiding may: - Violate computer fraud laws - Breach organizational security policies - Trigger security monitoring alerts - Cause system instability or kernel panics ## Build Instructions ```bash # Build the module make # Load the module (specify PID to hide) sudo insmod pid_hider.ko hidden_pid=1234 # Remove the module sudo rmmod pid_hider ``` ## Legal Notice Use of this code on systems without explicit authorization may constitute a criminal offense under: - Computer Fraud and Abuse Act (CFAA) - EU Directive 2013/40/EU - Various international cybercrime laws ## Legitimate Alternatives For legitimate process management, consider: - Linux Control Groups (cgroups) - Container technologies (Docker, LXC) - Mandatory Access Control (SELinux, AppArmor) - Process accounting and auditing tools