RITRedteam / goofkitLinks
In line function hooking LKM rootkit
☆52Updated 5 years ago
Alternatives and similar repositories for goofkit
Users that are interested in goofkit are comparing it to the libraries listed below
Sorting:
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- ☆90Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆48Updated 5 years ago
- ☆47Updated 3 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Simple 32/64-bit PEs loader.☆139Updated 6 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆113Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated 3 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago
- ☆28Updated 6 years ago
- From directory deletion to SYSTEM shell☆112Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆163Updated 3 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆93Updated 6 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 6 years ago
- ☆49Updated 5 years ago