C5Hackr / Ring3-Rootkit-RemoverLinks
☆11Updated last year
Alternatives and similar repositories for Ring3-Rootkit-Remover
Users that are interested in Ring3-Rootkit-Remover are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆28Updated last year
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Updated last year
- A unique introduction to native runtime obfuscation.☆74Updated 11 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 9 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated this week
- ☆52Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated 3 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Utilizing DLang For Offensive Operations.☆14Updated 8 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆26Updated last year
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- using the gpu to hide your payload☆63Updated 3 years ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 8 months ago
- Troll TaskManager, and play with it .☆30Updated 6 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Updated 5 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- ☆36Updated last year
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated 9 months ago
- PoC arbitrary WPM without a process handle☆21Updated 2 years ago