TheMalwareGuardian / Bootkits-Rootkits-Development-EnvironmentLinks
Automated environment setup for Bootkit & Rootkit development.
☆19Updated 3 weeks ago
Alternatives and similar repositories for Bootkits-Rootkits-Development-Environment
Users that are interested in Bootkits-Rootkits-Development-Environment are comparing it to the libraries listed below
Sorting:
- ☆49Updated 5 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆108Updated 2 years ago
- ☆42Updated 2 years ago
- Windows UEFI Bootkit☆38Updated 2 weeks ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated 11 months ago
- ☆32Updated last year
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- ☆31Updated 8 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆82Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆67Updated 4 months ago
- Minifilter Callback Patching Proof-of-Concept☆72Updated 2 years ago
- ☆58Updated 4 months ago
- Next gen process injection technique☆54Updated 5 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆42Updated this week
- A 64 bit executable junk code engine for polymorphic malware.☆66Updated 2 months ago
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆20Updated last year
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆25Updated 3 months ago
- Payload Obfuscation for Red Teams workshop materials☆53Updated 2 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆87Updated last month
- ☆20Updated last week
- Mentally ill EtwTi parser☆65Updated last month
- Windows x64 kernel mode rootkit process hollowing POC.☆188Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Recon 2023 slides and code☆79Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- "Service-less" driver loading☆161Updated 9 months ago