ElliotAlderson51 / Kernel-Rootkit-32Bit
Rootkit for Windows 32-bit
☆7Updated 3 years ago
Alternatives and similar repositories for Kernel-Rootkit-32Bit:
Users that are interested in Kernel-Rootkit-32Bit are comparing it to the libraries listed below
- Infects PE files with a shellcode☆16Updated 6 years ago
- Скрытие Win API☆25Updated 5 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆16Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆17Updated 7 months ago
- Скрытие процессов и файлов в user mode☆20Updated 5 years ago
- Overwrite MBR and add own custom message☆14Updated 4 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆15Updated 8 months ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆18Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- ⚙️ Map and execute EXE in memory☆10Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆28Updated 3 months ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆14Updated 5 years ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated last year
- A library with four different methods to execute shellcode in a process☆24Updated 4 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Reverse Socks5 proxy for windows☆13Updated 2 years ago
- Signature scanner and API hooks to detect malicious process injection☆22Updated last year
- minimal msvc-windows exclusive lazy importer for C++☆32Updated 3 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- filter driver to hide files and directories☆18Updated 11 months ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆13Updated 6 months ago