Skip to content

NicolasYDDER/jellyfish

This branch is 68 commits ahead of LucaBongiorni/jellyfish:master.

Folders and files

NameName
Last commit message
Last commit date

Latest commit

author
silas
May 14, 2015
121d3e6 · May 14, 2015

History

81 Commits
May 14, 2015
May 14, 2015
May 9, 2015
May 14, 2015
May 8, 2015
May 14, 2015

Repository files navigation

Jellyfish is a Linux based userland gpu rootkit proof of concept project utilizing the LD_PRELOAD technique from Jynx (CPU), as well as the OpenCL API developed by Khronos group (GPU). Code currently supports AMD and NVIDIA graphics cards. However, the AMDAPPSDK does support Intel as well.

Some advantages of gpu stored memory:

  • No gpu malware analysis tools available on web
  • Can snoop on cpu host memory via DMA
  • Gpu can be used for fast/swift mathematical calculations like xor'ing or parsing
  • Stub/signature generation
  • Malicious memory may be retained across warm reboots. (Did more conductive research on the theory of malicious memory still being in gpu after shutdown)

Requirements for use:

  • Have OpenCL drivers/icds installed (Fun fact: Mac OS X boxes come pre-installed with OpenCL)
  • Nvidia or AMD graphics card (intel supports amd's sdk)

Features (more features soon):

  • client listener, record data to gpu and send magic packet when ready to dump

Heads up:

  • Windows GPU Remote Access Tool (RAT) PoC official release @ /WIN_JELLY
  • Working on PoC for Mac OS X @ /MAC_JELLY

Disclaimer:

  • Educational purposes only; authors of this project/demonstration are in no way, shape or form responsible for what you may use this for whether illegal or not.

About

GPU rootkit PoC by Team Jellyfish

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 94.2%
  • CMake 5.8%