C5Hackr / Ring3-Rootkit-RemoverLinks
☆12Updated last year
Alternatives and similar repositories for Ring3-Rootkit-Remover
Users that are interested in Ring3-Rootkit-Remover are comparing it to the libraries listed below
Sorting:
- ☆12Updated 10 months ago
- Ransomware written in go, encrypt - decrypt.☆26Updated 4 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆79Updated 6 months ago
- ☆27Updated 10 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆22Updated 3 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆18Updated 3 months ago
- Decrypting yandex browser passwords☆24Updated 4 months ago
- Advanced dynamic malware analysis tool.☆84Updated last year
- ☆44Updated 11 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆20Updated 4 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆41Updated 3 months ago
- Troll TaskManager, and play with it .☆25Updated 3 weeks ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 4 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆118Updated 4 months ago
- Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in…☆35Updated 4 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆13Updated 8 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 4 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆19Updated 7 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 4 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆49Updated 3 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆68Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- The best powershell obfuscator ever made☆111Updated 3 weeks ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- A unique introduction to native runtime obfuscation.☆23Updated 5 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 4 months ago
- ☆125Updated 10 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆73Updated last month