Exploit Pack - Documentation
  • Exploit Pack
    • Installation guide
    • License Activation
    • First steps
    • Running the network mapper
    • AutoPwn
    • UTF-8 Locator
    • Notepad
    • Reverse shell - One-liners
    • Hex Editor
    • GDB Connector
    • Log your actions
    • Exploits customization
    • Add a Proxy to Exploit Pack
    • Using Reverse Shells
    • XSS Agent - Tunnel
    • Advanced DLL Injections
    • VBS/PS Agent - Remote Access
    • VBS Agent Wizard
    • Exploit Development I
    • Exploit Development II
    • Exploit Development III
  • Control Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Control Pack
    • Launch your first agent
    • Control Pack agent's code
    • Agent connection
    • Java Agent
    • Browser Agent
    • VBS Agent
    • .NET Profiler DLL Agent
    • How to use the DLL + UnHooker Agent
    • .NET shell
    • Python Shell
  • Kernel Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Kernel Pack
    • Generating a new Rootkit
    • Deploying a Rootkit
    • Process hiding
    • Other features
Powered by GitBook
On this page

Was this helpful?

  1. Kernel Pack

Generating a new Rootkit

PreviousFirst Steps: Configure Kernel PackNextDeploying a Rootkit

Last updated 4 days ago

Was this helpful?

Let's start from the beginning: What is a Rootkit?

A rootkit is a type of malicious software designed to gain unauthorised access to a computer system while hiding its presence or the presence of other malware. Once installed, a rootkit can operate at various levels: user mode, kernel mode, or even firmware, making it especially difficult to detect and remove.

Rootkits often manipulate system processes, drivers, or kernel functions to conceal their activity. This allows attackers to maintain persistent access, bypass security controls, and quietly exfiltrate data or escalate privileges.

Let's generate a new rootkit with Kernel Pack:

Go to "Remote Control" → "Rootkit Wizard (driver)". Carefully read the disclaimer that appears. Then, click either "Decline" or "I Accept".

If you click "I Accept", a new window will open. From there, select your desired options for the rootkit, generate and save it.