Environment and Virtual Machine setup instructions
Host Environment Setup
Prepare your host system for running EpiRootkit VMs
VM Installation & Verification
Set up and verify the attacker and victim VMs
Attacker VM Setup
Configure the attacking VM with C2 server and web interface
Victim VM Setup
Configure the victim VM and deploy the EpiRootkit
Host to VM File Transfer
Methods for transferring files from host to QEMU VMs
Dropper Deployment
Social engineering tool for automated rootkit deployment