29942016 / DKOM-RootkitLinks
Attempt at recreating a windows-based DKOM rootkit using c#
☆12Updated 9 years ago
Alternatives and similar repositories for DKOM-Rootkit
Users that are interested in DKOM-Rootkit are comparing it to the libraries listed below
Sorting:
- C# Codedom example / builder☆24Updated 5 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 8 years ago
- Download a payload and make it run from registry without droppng.☆110Updated 6 years ago
- Polymorph file protector☆43Updated 6 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- Detect virtual environment☆66Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Hide malware behind a legit process C#☆125Updated 5 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆44Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 3 months ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 5 years ago
- Simple C# Keylogger (Keyboard Layout)☆66Updated 6 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆66Updated 6 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Updated 8 years ago
- A Simple AES Command Line Crypter☆37Updated 2 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- This script make any windows compatible with RDP connection☆21Updated last month
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆72Updated 8 years ago
- njRAT C# Stub - Fixed For PowerShell☆59Updated 6 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 2 years ago
- UAC Bypass for windows☆37Updated 5 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Revenge-RAT C# Stub - Fixed☆93Updated 5 years ago
- JS Jscript - download file from url then run it☆62Updated 5 years ago
- ☆13Updated 8 years ago
- Software Protector☆19Updated 5 years ago
- Escalation / Bypass Windows UAC☆115Updated 6 years ago