0x44F / WinKit
💻 Windows 10 Kernel-mode rootkit
☆31Updated 2 years ago
Alternatives and similar repositories for WinKit:
Users that are interested in WinKit are comparing it to the libraries listed below
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 10 months ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- ☆52Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- A simple PE loader.☆25Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- ☆37Updated last month
- ☆37Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Change hash for a signed pe☆16Updated last year
- ☆36Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- using the gpu to hide your payload☆56Updated 2 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Threadless injection via TLS callbacks☆16Updated 4 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year