brosck / FrostyLinks
γπ§γRing 3 Rootkit for Windows 10
β57Updated 10 months ago
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- Kernel Mode Driver for Elevating Process Privilegesβ134Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram checkβ139Updated 2 years ago
- Create Anti-Copy DRM Malwareβ67Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β69Updated last year
- BYOVD Technique Example using viragt64 driverβ57Updated last year
- Various methods of executing shellcodeβ72Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPEβ66Updated last year
- Splitting and executing shellcode across multiple pagesβ103Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploitβ41Updated 2 years ago
- Rex Shellcode Loader for AV/EDR evasionβ34Updated last year
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ25Updated 6 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β64Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing Rβ¦β58Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.β117Updated 5 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ73Updated 2 years ago
- β50Updated 3 years ago
- Linux Sleep Obfuscationβ105Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exeβ107Updated last year
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader featureβ101Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in Cβ133Updated last month
- User Mode Windows Rootkitβ68Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.β110Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, anβ¦β180Updated 2 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".β87Updated 2 years ago
- β39Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)β84Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ44Updated 2 years ago
- This is a simple process injection made in C for Linux systemsβ29Updated 2 years ago