Idov31 / NidhoggLinks
Nidhogg is an all-in-one simple to use windows kernel rootkit.
☆2,096Updated this week
Alternatives and similar repositories for Nidhogg
Users that are interested in Nidhogg are comparing it to the libraries listed below
Sorting:
- Collection of various malicious functionality to aid in malware development☆1,746Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,185Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆813Updated this week
- A modern 32/64-bit position independent implant template☆1,256Updated 6 months ago
- ☆1,719Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,510Updated last year
- A tool to kill antimalware protected processes☆1,470Updated 4 years ago
- EDR Lab for Experimentation Purposes☆1,349Updated 2 months ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆920Updated 3 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Updated last year
- AV/EDR evasion via direct system calls.☆1,735Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,732Updated last year
- Now You See Me, Now You Don't☆986Updated last month
- Win32 and Kernel abusing techniques for pentesters☆963Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks☆1,631Updated 2 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,021Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,000Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,104Updated 4 years ago
- Living Off The Land Drivers☆1,295Updated 2 weeks ago
- ☆2,143Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆999Updated 4 months ago
- AV/EDR evasion via direct system calls.☆1,930Updated 2 years ago
- kill anti-malware protected processes ( BYOVD ) ( Microsoft Won )☆967Updated 2 years ago
- Process Hollowing (Malware Technique)☆1,353Updated 5 months ago
- The swiss army knife of LSASS dumping☆2,010Updated last year
- This program is designed to demonstrate various process injection techniques☆1,186Updated last month
- Awesome EDR Bypass Resources For Ethical Hacking☆1,290Updated 3 months ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆982Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,491Updated last year
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,163Updated 3 years ago