Idov31 / Nidhogg
Nidhogg is an all-in-one simple to use windows kernel rootkit.
☆1,962Updated 2 weeks ago
Alternatives and similar repositories for Nidhogg:
Users that are interested in Nidhogg are comparing it to the libraries listed below
- A modern 32/64-bit position independent implant template☆1,198Updated last month
- ☆1,639Updated 8 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,421Updated 9 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,038Updated 3 years ago
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆744Updated last week
- AV/EDR evasion via direct system calls.☆1,656Updated 2 years ago
- A tool to kill antimalware protected processes☆1,441Updated 3 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,095Updated last year
- Living Off The Land Drivers☆1,160Updated last month
- Open-Source Shellcode & PE Packer☆1,941Updated last year
- Collection of various malicious functionality to aid in malware development☆1,636Updated last year
- ☆2,098Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks☆1,558Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆949Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,175Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,673Updated last year
- The swiss army knife of LSASS dumping☆1,922Updated 7 months ago
- Now You See Me, Now You Don't☆936Updated 4 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆967Updated last year
- AV/EDR evasion via direct system calls.☆1,867Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,172Updated 3 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,242Updated this week
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆902Updated 3 years ago
- Process Hollowing (Malware Technique)☆1,325Updated last week
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆932Updated last year
- ☆750Updated last year
- Converts PE into a shellcode☆2,533Updated last year
- This program is designed to demonstrate various process injection techniques☆1,143Updated last year
- Syscall Shellcode Loader (Work in Progress)☆1,188Updated last year
- LoadLibrary for offensive operations☆1,137Updated 3 years ago