Skip to content

☠️ rupurt - Advanced Linux rootkit hunter with 250+ signatures, eBPF analysis, memory forensics & APT detection

License

Notifications You must be signed in to change notification settings

bad-antics/rupurt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

██████╗ ██╗   ██╗██████╗ ██╗   ██╗██████╗ ████████╗
██╔══██╗██║   ██║██╔══██╗██║   ██║██╔══██╗╚══██╔══╝
██████╔╝██║   ██║██████╔╝██║   ██║██████╔╝   ██║   
██╔══██╗██║   ██║██╔═══╝ ██║   ██║██╔══██╗   ██║   
██║  ██║╚██████╔╝██║     ╚██████╔╝██║  ██║   ██║   
╚═╝  ╚═╝ ╚═════╝ ╚═╝      ╚═════╝ ╚═╝  ╚═╝   ╚═╝   
              ☠️ Linux Rootkit Hunter

rupurt Version Signatures Modules License

Stars

Comprehensive Linux rootkit detection with modern threat signatures, eBPF analysis, memory forensics, and APT implant detection


💻 Tech Stack

Core

C Linux POSIX

Detection Targets

eBPF Kernel Docker Kubernetes

Platforms

AMD64 ARM64


⚡ Features

🔍 Detection Modules

Module Description
Syscall Analysis Detects syscall table hijacking and hooking
eBPF Scanner Identifies malicious eBPF programs
Memory Forensics Scans for hidden processes and injected code
Kernel Integrity Validates kernel text and module signatures
Network Analysis Detects hidden network connections
File System Finds hidden files and rootkit artifacts
Process Scanner Identifies process hollowing and hiding
Container Escape Detects container breakout attempts
APT Detection Signatures for nation-state implants

📊 Signature Database

  • 280+ rootkit signatures (Diamorphine, Reptile, Drovorub, etc.)
  • APT implant detection (Equation Group, Turla, Lazarus)
  • Cryptominer detection (XMRig, TeamTNT variants)
  • Container-specific threats (Siloscape, cr8escape)

🚀 Installation

# Clone repository
git clone https://github.com/bad-antics/rupurt
cd rupurt

# Build from source
make

# Install system-wide
sudo make install

# Run scan
sudo rupurt --full

📖 Usage

# Quick scan (essential checks)
sudo rupurt --quick

# Full system scan
sudo rupurt --full

# Paranoid mode (everything)
sudo rupurt --paranoid

# Specific modules
sudo rupurt --syscall --ebpf --memory

# JSON output for SIEM integration
sudo rupurt --full --json > report.json

# Continuous monitoring
sudo rupurt --monitor --interval 300

🔧 Command Line Options

Option Description
--quick Fast essential checks
--full Complete system scan
--paranoid Maximum detection sensitivity
--syscall Syscall table analysis
--ebpf eBPF program scanner
--memory Memory forensics
--kernel Kernel integrity check
--network Hidden network detection
--process Process hiding detection
--container Container escape detection
--apt APT implant signatures
--json JSON output format
--monitor Continuous monitoring mode
--update Update signature database

🎯 What It Detects

Kernel Rootkits

  • Syscall table modifications
  • IDT/GDT hooks
  • Kernel text modifications
  • Hidden kernel modules
  • Malicious eBPF programs

Userspace Threats

  • LD_PRELOAD hijacking
  • Process injection
  • Shared library hooking
  • Hidden processes
  • Memory-resident malware

Container Threats

  • Container escape attempts
  • Privileged container abuse
  • cgroup manipulation
  • Namespace breakouts

APT Implants

  • Equation Group tools
  • Turla Snake/Uroburos
  • Lazarus Group malware
  • Winnti backdoors

📁 Output Example

██████╗ ██╗   ██╗██████╗ ██╗   ██╗██████╗ ████████╗
██╔══██╗██║   ██║██╔══██╗██║   ██║██╔══██╗╚══██╔══╝
██████╔╝██║   ██║██████╔╝██║   ██║██████╔╝   ██║   
██╔══██╗██║   ██║██╔═══╝ ██║   ██║██╔══██╗   ██║   
██║  ██║╚██████╔╝██║     ╚██████╔╝██║  ██║   ██║   
╚═╝  ╚═╝ ╚═════╝ ╚═╝      ╚═════╝ ╚═╝  ╚═╝   ╚═╝   
              ☠️ Linux Rootkit Hunter v2.5.0

[*] Starting full system scan...
[+] Kernel: Linux 6.5.0-generic x86_64
[+] Scanning syscall table...
[+] Checking eBPF programs...
[!] WARNING: Suspicious eBPF program detected
    Program ID: 42
    Type: tracepoint
    Attach: sys_enter_openat
[+] Memory analysis...
[+] Checking hidden processes...
[+] Network connection analysis...
[+] File system scan...

══════════════════════════════════════════════════════════════════
                         SCAN SUMMARY
══════════════════════════════════════════════════════════════════
  Modules scanned: 15
  Checks performed: 847
  Warnings: 1
  Critical: 0
  Time elapsed: 12.4s
══════════════════════════════════════════════════════════════════

📜 License

MIT License - See LICENSE for details.


bad-antics

Hunt the hunters.

About

☠️ rupurt - Advanced Linux rootkit hunter with 250+ signatures, eBPF analysis, memory forensics & APT detection

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published

Contributors 2

  •  
  •