• code Presentation
    • Host Environment Setup
    • VM Installation & Verification
    • Attacker VM Setup
    • Victim VM Setup
    • Host to VM File Transfer
    • Dropper Deployment
    • Overview
    • Installation
    • Command Reference
    • Usage
    • Overview
    • Installation
      • Authentication
      • Dashboard
      • Client Management
        • Terminal Panel
        • Persistence Panel
        • Event Log Panel
        • Upload/Download Panel
        • Overview Panel
        • Configuration Panel
        • Authentication Panel
    • Configuration Justifications
    • EpiRootkit Overview
    • Build & Deployment
    • Connection & Authentication
      • Command Execution
      • DNS Resolution
      • Encryption
      • Sysfs Interface
      • Module Hiding
      • File Hiding
      • Persistence
      • Line Hiding
      • File Transfer
    • Unwelcome Guests
    • Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    On this page
    article

    Docs

    code

    Presentation

    whoami

    code folder

    Setup

    Environment and Virtual Machine setup instructions

    article folder

    Attacking Program (C2 Backend)

    C2 backend for EpiRootkit management with CLI interface

    monitor folder

    Web UI (C2 Frontend)

    React-based web interface for EpiRootkit C2

    shield folder

    EpiRootkit

    Linux kernel rootkit implementation for kernel 5.4.0

    star folder

    Bonus

    Miscellaneous and discoveries

    favorite

    Un dernier mot

    Merci <3


    © 2025 Tux Fan Club. Built with Lotus Docs