bootkitsbook / rootkitsLinks
☆108Updated 6 years ago
Alternatives and similar repositories for rootkits
Users that are interested in rootkits are comparing it to the libraries listed below
Sorting:
- ☆68Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆161Updated 6 years ago
- Driver Initial Reconnaissance Tool☆124Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆127Updated 3 years ago
- Windows Kernel Programming☆132Updated 5 years ago
- ☆164Updated 4 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
- ☆73Updated 2 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆230Updated 5 years ago
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- ☆122Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆306Updated 7 years ago
- This is a place to share my miscellaneous projects.☆115Updated 5 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 7 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 6 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- Hyper-V Research is trendy now☆189Updated last year
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Updated last year
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆218Updated 3 years ago
- ☆21Updated last month
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- ☆12Updated 4 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago