TheMalwareGuardian / Bentico
Windows Kernel Mode Rootkit
☆44Updated 3 weeks ago
Alternatives and similar repositories for Bentico:
Users that are interested in Bentico are comparing it to the libraries listed below
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆37Updated 3 weeks ago
- Windows rootkit designed to work with BYOVD exploits☆175Updated 2 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆174Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated last month
- UEFI Windows Bootkit☆30Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆168Updated 3 weeks ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆177Updated last year
- ☆137Updated 5 months ago
- A PowerShell console in C/C++ with all the security features disabled☆216Updated 2 weeks ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆233Updated 3 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆144Updated 9 months ago
- Sleep obfuscation☆212Updated 3 months ago
- ☆103Updated 5 months ago
- ☆152Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆159Updated 3 months ago
- A PoC for Early Cascade process injection technique.☆174Updated 2 months ago
- ☆137Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆184Updated last year
- ☆107Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆75Updated last month
- ☆148Updated 8 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆47Updated 3 weeks ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- A Mythic Agent written in PIC C.☆185Updated last month
- kernel callback removal (Bypassing EDR Detections)☆142Updated last week
- This repository implements Threadless Injection in C☆161Updated last year
- random code snippets, useful for getting started☆118Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year