A curated compilation of extensive resources dedicated to bootkit and rootkit development.
☆199Aug 9, 2025Updated 7 months ago
Alternatives and similar repositories for Awesome-Bootkits-Rootkits-Development
Users that are interested in Awesome-Bootkits-Rootkits-Development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆59Aug 15, 2025Updated 7 months ago
- Automated environment setup for Bootkit & Rootkit development.☆38Aug 9, 2025Updated 7 months ago
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆42Aug 15, 2025Updated 7 months ago
- Windows UEFI Bootkit☆89Nov 24, 2025Updated 4 months ago
- Windows Kernel Rootkit☆63Nov 24, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Another UEFI runtime bootkit☆37May 8, 2023Updated 2 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆119Oct 15, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆14Apr 15, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Bring your own Unwind Data Framework☆105Mar 15, 2026Updated last week
- Rust 重构的 sRDI☆17Sep 9, 2024Updated last year
- Hijacking Hyper-V at Runtime with DDMA☆92Aug 13, 2025Updated 7 months ago
- A reflective DLL development template for the Rust programming language☆116Nov 4, 2025Updated 4 months ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆22Feb 19, 2023Updated 3 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool to dump EFI runtime drivers.☆39Feb 23, 2024Updated 2 years ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated last year
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆66Aug 15, 2022Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- ☆17Aug 26, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- ☆18Oct 15, 2024Updated last year
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- AV/EDR Lab environment setup references to help in Malware development☆457Feb 19, 2025Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆200Jun 17, 2025Updated 9 months ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago