DualHorizon / blackpillLinks
A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs
☆335Updated 3 weeks ago
Alternatives and similar repositories for blackpill
Users that are interested in blackpill are comparing it to the libraries listed below
Sorting:
- Evasion by machine code de-optimization.☆388Updated 11 months ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆234Updated 2 weeks ago
- Windows Kernel Rootkit in Rust☆625Updated last week
- ROP-based sleep obfuscation to evade memory scanners☆358Updated 3 weeks ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆255Updated last year
- io_uring based rootkit☆215Updated 2 months ago
- ☆12Updated 6 months ago
- nysm is a stealth post-exploitation container.☆252Updated 3 weeks ago
- Tools for analyzing EDR agents☆232Updated last year
- Collection of codes focused on Linux rootkits☆132Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆323Updated last month
- eBPF hacks☆188Updated 7 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆317Updated 9 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆196Updated 3 months ago
- PoCs for Kernelmode rootkit techniques research.☆376Updated 5 months ago
- Red-Team Linux kernel rootkit☆514Updated 2 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆272Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆295Updated last year
- Call Stack Spoofing for Rust☆178Updated last week
- Collect Windows telemetry for Maldev☆364Updated last week
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆285Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆50Updated 4 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆291Updated 2 weeks ago
- Threadless Process Injection through entry point hijacking☆347Updated 10 months ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆398Updated 2 weeks ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- ☆303Updated 8 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆349Updated 5 months ago
- Proof of concept & details for CVE-2025-21298☆186Updated 5 months ago