0x44F / WinKitLinks
💻 Windows 10 Kernel-mode rootkit
☆31Updated 2 years ago
Alternatives and similar repositories for WinKit
Users that are interested in WinKit are comparing it to the libraries listed below
Sorting:
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 4 years ago
- A simple PE loader.☆26Updated 2 years ago
- Process Injection: APC Injection☆33Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- using the gpu to hide your payload☆58Updated 2 years ago
- ☆16Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- ☆39Updated 4 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago
- ☆15Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆56Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- Process Hollowing POC in CPP☆16Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- ☆39Updated 2 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- ☆54Updated 2 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆12Updated last year