A programmable and rootkit-like Windows remote access tool.
☆149Jan 6, 2026Updated last month
Alternatives and similar repositories for Windows-Batch-Deployment
Users that are interested in Windows-Batch-Deployment are comparing it to the libraries listed below
Sorting:
- ☆10Aug 16, 2019Updated 6 years ago
- ☆125May 23, 2020Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆87Apr 3, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- A kernel-mode rootkit with remote control☆221Nov 13, 2020Updated 5 years ago
- Windows CVE主防(HIPS/HIDS)☆57Apr 29, 2021Updated 4 years ago
- Manual PE image mapper☆66Aug 29, 2013Updated 12 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- network filter driver that control network send speed, based on windows tdi framework.☆31Feb 16, 2024Updated 2 years ago
- A free but powerful Windows kernel research tool.☆2,650Dec 14, 2025Updated 2 months ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Mar 5, 2021Updated 4 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- ☆58Updated this week
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- Open Course for diving security internal☆52Nov 11, 2019Updated 6 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Aug 31, 2020Updated 5 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago