C5Hackr / Ring3-Rootkit-RemoverLinks
☆11Updated last year
Alternatives and similar repositories for Ring3-Rootkit-Remover
Users that are interested in Ring3-Rootkit-Remover are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆28Updated last year
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 11 months ago
- Decrypting yandex browser passwords☆27Updated 10 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19Updated 9 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆22Updated 10 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated 3 months ago
- using the gpu to hide your payload☆63Updated 3 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆26Updated last year
- Troll TaskManager, and play with it .☆30Updated 6 months ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated this week
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- reverse engineering random malwares☆22Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 8 months ago
- simple user-mode Rootkit☆108Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Updated last year
- Utilizing DLang For Offensive Operations.☆14Updated 8 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Updated last year
- ☆52Updated last year
- PoC arbitrary WPM without a process handle☆21Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆73Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago