aitorfirm / BlackIrisLinks
Thats it! An Open-Source Windows UEFI Rootkit
☆26Updated 4 months ago
Alternatives and similar repositories for BlackIris
Users that are interested in BlackIris are comparing it to the libraries listed below
Sorting:
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Updated 8 months ago
- A bunch of shenanigans using functions, VEH and more☆37Updated 5 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- ☆32Updated 9 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆26Updated 7 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆38Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆13Updated last year
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆44Updated 2 weeks ago
- a demo module for the kaine agent to execute and inject assembly modules☆42Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆58Updated 4 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- Windows C++ Implant for Exploration C2☆43Updated last week
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- One-header configurable C++20 COFF loader☆21Updated 3 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆50Updated last year
- ☆43Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆67Updated 8 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆65Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 8 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 5 months ago