28Zaaky / Usermode-RootkitLinks
Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.
☆26Updated 2 weeks ago
Alternatives and similar repositories for Usermode-Rootkit
Users that are interested in Usermode-Rootkit are comparing it to the libraries listed below
Sorting:
- Embed a payload inside a PNG file☆368Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 4 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆446Updated 8 months ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆423Updated 3 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Updated 9 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Updated 5 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆352Updated 2 years ago
- ☆238Updated 10 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆173Updated last month
- PDF dropper Red Team Scenairos☆230Updated last year
- Analyse your malware to surgically obfuscate it☆517Updated last month
- Obfuscate the bytes of your payload with an association dictionary☆75Updated 3 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆440Updated last year
- My collection of malware dev links☆307Updated last week
- Sliver CheatSheet for OSEP☆242Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆108Updated last year
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆23Updated 5 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆260Updated 9 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆399Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 9 months ago