Idov31 / NidhoggLinks
Nidhogg is an all-in-one simple to use windows kernel rootkit.
☆2,087Updated this week
Alternatives and similar repositories for Nidhogg
Users that are interested in Nidhogg are comparing it to the libraries listed below
Sorting:
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆803Updated 3 weeks ago
- Collection of various malicious functionality to aid in malware development☆1,735Updated last year
- AV/EDR evasion via direct system calls.☆1,730Updated 3 years ago
- A tool to kill antimalware protected processes☆1,467Updated 4 years ago
- Now You See Me, Now You Don't☆978Updated last week
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,172Updated last year
- Process Hollowing (Malware Technique)☆1,350Updated 4 months ago
- Win32 and Kernel abusing techniques for pentesters☆961Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,094Updated 4 years ago
- ☆1,707Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,725Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,496Updated last year
- A modern 32/64-bit position independent implant template☆1,260Updated 5 months ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆916Updated 3 years ago
- Open-Source Shellcode & PE Packer☆1,994Updated last year
- AV/EDR evasion via direct system calls.☆1,924Updated 2 years ago
- Living Off The Land Drivers☆1,280Updated 2 weeks ago
- ☆2,139Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,283Updated 3 months ago
- LoadLibrary for offensive operations☆1,150Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks☆1,624Updated 2 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,159Updated 3 years ago
- This program is designed to demonstrate various process injection techniques☆1,181Updated last month
- The swiss army knife of LSASS dumping☆1,999Updated 11 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,484Updated last year
- A C# Command & Control framework☆1,014Updated last year
- EDR Lab for Experimentation Purposes☆1,342Updated last month
- Converts PE into a shellcode☆2,645Updated 2 weeks ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,999Updated 2 weeks ago