Python tool to check rootkits in Windows kernel
☆209Aug 20, 2025Updated 7 months ago
Alternatives and similar repositories for Kdrill
Users that are interested in Kdrill are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 9 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆361Aug 11, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- ☆147Oct 29, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆593Jun 12, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆291May 27, 2024Updated last year
- anti-ransomware file-system filter☆69Sep 3, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆436Mar 25, 2026Updated 2 weeks ago
- ☆157Jul 31, 2022Updated 3 years ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆338Feb 27, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆27May 6, 2024Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆273Oct 31, 2024Updated last year
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆702Oct 22, 2025Updated 5 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆594Aug 2, 2025Updated 8 months ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆462Aug 2, 2024Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆175May 13, 2024Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆595Jan 5, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆155Jun 10, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- Evasion by machine code de-optimization.☆423Jul 22, 2024Updated last year
- ☆183Apr 24, 2025Updated 11 months ago
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 2 weeks ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆84May 19, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆152Apr 26, 2024Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆378May 24, 2022Updated 3 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Collect Windows telemetry for Maldev☆467Jan 30, 2026Updated 2 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆188Jan 23, 2024Updated 2 years ago