TheMalwareGuardian / Awesome-Bootkits-Rootkits-DevelopmentLinks
A curated compilation of extensive resources dedicated to bootkit and rootkit development.
☆99Updated 3 weeks ago
Alternatives and similar repositories for Awesome-Bootkits-Rootkits-Development
Users that are interested in Awesome-Bootkits-Rootkits-Development are comparing it to the libraries listed below
Sorting:
- Early work on Benthic Windows Kernel Rootkit☆55Updated 2 weeks ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆231Updated 10 months ago
- ☆160Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆205Updated 7 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆148Updated 5 months ago
- Collection of codes focused on Linux rootkits☆150Updated 2 weeks ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆169Updated 5 months ago
- Injecting DLL into LSASS at boot☆137Updated 4 months ago
- Early Work on Abyss Windows UEFI Bootkit☆43Updated 2 weeks ago
- kernel callback removal (Bypassing EDR Detections)☆187Updated 5 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆353Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆130Updated 3 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆205Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆255Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆204Updated 4 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆120Updated 4 months ago
- Generate an Alphabetical Polymorphic Shellcode☆109Updated 2 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆355Updated 6 months ago
- ☆356Updated 2 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread