28Zaaky / Usermode-RootkitLinks
Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.
☆26Updated 2 weeks ago
Alternatives and similar repositories for Usermode-Rootkit
Users that are interested in Usermode-Rootkit are comparing it to the libraries listed below
Sorting:
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Updated last year
- Embed a payload inside a PNG file☆368Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 4 months ago
- Analyse your malware to surgically obfuscate it☆517Updated last month
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Updated 9 months ago
- Obfuscate the bytes of your payload with an association dictionary☆75Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Updated 5 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆423Updated 3 months ago
- ☆238Updated 10 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆173Updated last month
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆446Updated 8 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆352Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Updated last year
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆23Updated 5 months ago
- My collection of malware dev links☆307Updated last week
- Sliver CheatSheet for OSEP☆242Updated 2 months ago
- A simple script to automate systemd backdoor☆38Updated 3 years ago
- Polymorphic Command & Control☆102Updated 11 months ago
- PDF dropper Red Team Scenairos☆230Updated last year
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Updated last year
- A PoC for Early Cascade process injection technique.☆205Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago
- C++ Reflective Assembly Loader☆30Updated 11 months ago
- A guide to learning antivirus evasion☆62Updated 10 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆440Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago