0xd3xt3r / awesome-windows-rootkits
Collection of windows rootkits
☆25Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-windows-rootkits
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆69Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆63Updated 3 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 2 months ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆66Updated 2 years ago
- 2022 Updated Kernelmode-Code☆30Updated 8 months ago
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- ☆49Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆47Updated 4 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 9 months ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- ☆22Updated 4 years ago
- May the POC be with you☆50Updated this week
- Fileless persistence, attacks and anti-forensic capabilties.☆87Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year