A curated compilation of extensive resources dedicated to bootkit and rootkit development.
☆186Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for Awesome-Bootkits-Rootkits-Development
Users that are interested in Awesome-Bootkits-Rootkits-Development are comparing it to the libraries listed below
Sorting:
- Automated environment setup for Bootkit & Rootkit development.☆36Aug 9, 2025Updated 6 months ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆59Aug 15, 2025Updated 6 months ago
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆41Aug 15, 2025Updated 6 months ago
- Windows UEFI Bootkit☆85Nov 24, 2025Updated 3 months ago
- Windows Kernel Rootkit☆60Nov 24, 2025Updated 3 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Another UEFI runtime bootkit☆37May 8, 2023Updated 2 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated 11 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆119Oct 15, 2024Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆13Apr 15, 2024Updated last year
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- Rust 重构的 sRDI☆17Sep 9, 2024Updated last year
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Tool to dump EFI runtime drivers.☆39Feb 23, 2024Updated 2 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆22Feb 19, 2023Updated 3 years ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆54Updated this week
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆595Feb 24, 2026Updated last week
- AV/EDR Lab environment setup references to help in Malware development☆426Feb 19, 2025Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- A reflective DLL development template for the Rust programming language☆115Nov 4, 2025Updated 4 months ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago