Jokas-null / Windows_RootKit
A windows kernel-mode rootkit with remote control
☆12Updated 2 years ago
Alternatives and similar repositories for Windows_RootKit:
Users that are interested in Windows_RootKit are comparing it to the libraries listed below
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆9Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- Hellokitty Ransomware Source Code☆15Updated last year
- Loader and RunPE file executer☆17Updated 5 years ago
- A very weird RAT☆19Updated 2 years ago
- Lightweight Threat Detection System - (Base)☆14Updated last year
- ☆7Updated 5 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆12Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- A simple PE loader.☆25Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated this week
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- really ?☆12Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago