brosck / FrostyLinks
γπ§γRing 3 Rootkit for Windows 10
β58Updated 9 months ago
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- BYOVD Technique Example using viragt64 driverβ53Updated last year
- Kernel Mode Driver for Elevating Process Privilegesβ133Updated 2 years ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Various methods of executing shellcodeβ72Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPEβ65Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.β116Updated 4 months ago
- Create Anti-Copy DRM Malwareβ65Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β69Updated last year
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- Bypass Malware Sandbox Evasion Ram checkβ139Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploitβ41Updated last year
- Splitting and executing shellcode across multiple pagesβ101Updated 2 years ago
- Linux Sleep Obfuscationβ106Updated last year
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ25Updated 5 months ago
- β38Updated 2 years ago
- using the gpu to hide your payloadβ59Updated 3 years ago
- Rex Shellcode Loader for AV/EDR evasionβ34Updated last year
- β49Updated 3 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β64Updated 2 years ago
- API Hammering with C++20β49Updated 3 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ38Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)β84Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernelβ43Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing Rβ¦β58Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)β41Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loaderβ55Updated last year
- Windows C++ Implant for Exploration C2β41Updated this week
- Red Team Operation's Defense Evasion Technique.β55Updated last year
- Basic interactive Windows kernel offensive toolkit written in Cβ131Updated this week
- Small PoC of using a Microsoft signed executable as a lolbin.β138Updated 2 years ago