C5Hackr / Ring3-Rootkit-RemoverLinks
☆11Updated last year
Alternatives and similar repositories for Ring3-Rootkit-Remover
Users that are interested in Ring3-Rootkit-Remover are comparing it to the libraries listed below
Sorting:
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- ☆28Updated last year
- ☆12Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- ☆52Updated last year
- Troll TaskManager, and play with it .☆30Updated 5 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 10 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 8 months ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 3 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- reverse engineering random malwares☆22Updated last year
- ☆27Updated 3 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Updated 9 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated 9 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Updated last year
- Unhook Ntdll.dll, Go & C++.☆32Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- A malicous Golang Package☆15Updated 9 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆16Updated 7 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆128Updated last month
- Utilizing DLang For Offensive Operations.☆14Updated 8 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year