ZeroMemoryEx / URootkit
user-mode Rootkit
☆101Updated 2 years ago
Alternatives and similar repositories for URootkit:
Users that are interested in URootkit are comparing it to the libraries listed below
- Detect API Hooks☆71Updated 2 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated last year
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆167Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆157Updated last year
- Windows x64 kernel mode rootkit process hollowing POC.☆184Updated last year
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆217Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆104Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆80Updated last year
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆176Updated 3 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- Kernel Mode Driver for Elevating Process Privileges☆131Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆226Updated 6 months ago
- Admin to Kernel code execution using the KSecDD driver☆246Updated 8 months ago
- Next gen process injection technique☆43Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated last year
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆106Updated 2 years ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆130Updated 7 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Various Process Injection Techniques☆146Updated 2 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆170Updated 11 months ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆86Updated last year
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆40Updated 4 months ago