TheMalwareGuardian / Bentico
Windows Kernel Mode Rootkit
☆53Updated 3 weeks ago
Alternatives and similar repositories for Bentico
Users that are interested in Bentico are comparing it to the libraries listed below
Sorting:
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆51Updated 3 weeks ago
- A PoC for Early Cascade process injection technique.☆178Updated 3 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆58Updated last month
- ☆154Updated 5 months ago
- Injecting DLL into LSASS at boot☆105Updated 2 weeks ago
- ☆141Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- 「💀」Proof of concept on BYOVD attack☆159Updated 5 months ago
- ☆256Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆175Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆274Updated last month
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 8 months ago
- ☆155Updated 9 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆154Updated 4 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆187Updated last year
- Windows rootkit designed to work with BYOVD exploits☆198Updated 4 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 8 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆237Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated 3 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆301Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆258Updated 11 months ago
- Ghosting-AMSI☆169Updated 3 weeks ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆78Updated 2 months ago
- ☆137Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆187Updated 2 months ago
- A Mythic Agent written in PIC C.☆189Updated 3 months ago
- kernel callback removal (Bypassing EDR Detections)☆162Updated last month
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- This repository implements Threadless Injection in C☆167Updated last year