APT64 / KernelAVKiller
Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.
☆6Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for KernelAVKiller
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆40Updated 8 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 6 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 5 months ago
- API Hammering with C++20☆34Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year
- ☆106Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated 9 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- Next gen process injection technique☆42Updated 4 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆78Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated 10 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆59Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆62Updated last year
- a stage1 DLL loader with sleep obfuscation☆32Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 11 months ago
- A Poc on blocking Procmon from monitoring network events☆98Updated 2 years ago
- Various methods of executing shellcode☆68Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆36Updated 3 months ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆66Updated 2 years ago
- Collect Windows telemetry for Maldev☆57Updated this week
- Sleep Obfuscation☆41Updated 2 years ago
- ☆34Updated last year
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆39Updated 2 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆67Updated 2 years ago