Tool and Usage
|Author||Victor Ramos Mello|
|Latest release||No release found|
Why this tool?
Rootkits are typically considered to be malware, or malicious software. With the intent to hide, this type of software is often used after a breach. Learning about how it works can be useful for security researchers and security professionals.
How it works
This rootkit is using the Linux functionality of loadable kernel modules (LKM). It can be loaded with insmod or modprobe, after which is will start doing its nefarious job.
Usage and audience
Diamorphine is commonly used for learning. Target users for this tool are security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
Supported operating systems
Diamorphine is known to work on Linux.
Similar tools to Diamorphine:
chkrootkit is a malware scanner to locally check for signs of a rootkit. It is written in shell script and runs on the host system itself.
Security tool to search for traces of rootkits, backdoors, and other malicious components on systems running Linux and other flavors of Unix
Binary Analysis Next Generation (BANG) or binaryanalysis-ng is a security tool to perform binary analysis by Armijn Hemel. Learn how the tool works.
Found an improvement? Help the community by submitting an update.