TheMalwareGuardian / BenticoLinks
Windows Kernel Mode Rootkit
☆54Updated last month
Alternatives and similar repositories for Bentico
Users that are interested in Bentico are comparing it to the libraries listed below
Sorting:
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆56Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆118Updated 2 weeks ago
- ☆100Updated 3 months ago
- A PoC for Early Cascade process injection technique.☆178Updated 4 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆79Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated last week
- Windows rootkit designed to work with BYOVD exploits☆198Updated 4 months ago
- Sleep obfuscation☆224Updated 5 months ago
- UEFI Windows Bootkit☆40Updated 11 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆175Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆222Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated 11 months ago
- Ghosting-AMSI☆180Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- kernel callback removal (Bypassing EDR Detections)☆167Updated 2 months ago
- Injecting DLL into LSASS at boot☆113Updated last month
- ☆107Updated 7 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆242Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆218Updated 7 months ago
- Command and Control (C2) framework☆128Updated 3 weeks ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆66Updated this week
- ☆257Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 9 months ago
- 「💀」Proof of concept on BYOVD attack☆159Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ☆166Updated 10 months ago
- ☆141Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 6 months ago