TheMalwareGuardian / Bentico
Windows Kernel Mode Rootkit
☆10Updated 11 months ago
Alternatives and similar repositories for Bentico:
Users that are interested in Bentico are comparing it to the libraries listed below
- API Hammering with C++20☆45Updated 2 years ago
- ☆29Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 10 months ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- ☆12Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- EDR/AV Simulation for Malware Development☆12Updated last year
- Windows LPE Nday☆25Updated 10 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 6 months ago
- ☆36Updated last week
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆23Updated 7 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- Six cases demonstrating methods of optimizing GetProcAddress☆17Updated 3 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated 9 months ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆42Updated last year
- ☆20Updated last month
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated 10 months ago