Idov31 / Nidhogg
Nidhogg is an all-in-one simple to use windows kernel rootkit.
☆1,936Updated 3 weeks ago
Alternatives and similar repositories for Nidhogg:
Users that are interested in Nidhogg are comparing it to the libraries listed below
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆733Updated this week
- Collection of various malicious functionality to aid in malware development☆1,628Updated last year
- A modern 32/64-bit position independent implant template☆1,190Updated 3 weeks ago
- ☆1,624Updated 7 months ago
- Open-Source Shellcode & PE Packer☆1,932Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,175Updated last year
- ☆2,071Updated 2 years ago
- A tool to kill antimalware protected processes☆1,432Updated 3 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,407Updated 8 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,087Updated last year
- Alternative Shellcode Execution Via Callbacks☆1,549Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,154Updated 2 months ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆898Updated 3 years ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,231Updated 2 weeks ago
- AV/EDR evasion via direct system calls.☆1,863Updated 2 years ago
- Great explanation of Process Hollowing (a Technique often used in Malware)☆1,320Updated last year
- AV/EDR evasion via direct system calls.☆1,632Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆949Updated last year
- A C# Command & Control framework☆994Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,662Updated last year
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆933Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,027Updated 3 years ago
- Now You See Me, Now You Don't☆925Updated 3 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,450Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆963Updated last year
- LoadLibrary for offensive operations☆1,132Updated 3 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,643Updated 5 months ago
- The swiss army knife of LSASS dumping☆1,903Updated 7 months ago
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆935Updated last year
- This program is designed to demonstrate various process injection techniques☆1,130Updated last year