0xMrNiko / RootKitLinks
This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and security research. These tools enable advanced techniques like process hiding, syscall hooking, and runtime application manipulation.
☆13Updated 11 months ago
Alternatives and similar repositories for RootKit
Users that are interested in RootKit are comparing it to the libraries listed below
Sorting:
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Updated 9 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Collection of red team techniques.☆66Updated 9 months ago
- Attacking the cleanup_module function of a kernel module☆56Updated 7 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- This repo contains PoCs for vulnerable Windows drivers.☆118Updated last month
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month
- ☆147Updated last year
- The code I write in my blog☆62Updated last week
- ☆60Updated 9 months ago
- Windows AppLocker Driver (appid.sys) LPE☆73Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 9 months ago
- A command and control framework.☆54Updated last year
- UAC Bypass using CMSTP in Rust☆34Updated last year
- Create Anti-Copy DRM Malware☆71Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆63Updated 10 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- Linux Sleep Obfuscation☆107Updated 2 years ago
- ☆164Updated 11 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- Shellcode loader that executes embedded Lua from Rust.☆127Updated last year
- ☆108Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago