MandConsultingGroup / ring3-kitLinks
Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)
☆80Updated 2 years ago
Alternatives and similar repositories for ring3-kit
Users that are interested in ring3-kit are comparing it to the libraries listed below
Sorting:
- A Simple AES Command Line Crypter☆37Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- UAC Bypass for windows☆38Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 6 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆95Updated 4 months ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Alleged source code leak of Osiris banking trojan☆36Updated 4 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 5 months ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 7 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 6 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago
- ☆13Updated 8 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Software Protector☆19Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- TaskMgr Volatile Environment LPE☆16Updated 4 months ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago