brosck / FrostyLinks
γπ§γRing 3 Rootkit for Windows 10
β58Updated 8 months ago
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- Kernel Mode Driver for Elevating Process Privilegesβ132Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPEβ63Updated last year
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ25Updated 4 months ago
- Create Anti-Copy DRM Malwareβ63Updated last year
- Standalone Metasploit-like XOR encoder for shellcodeβ48Updated last year
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β69Updated last year
- Various methods of executing shellcodeβ72Updated 2 years ago
- BYOVD Technique Example using viragt64 driverβ49Updated last year
- β50Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)β70Updated last year
- Bypass Malware Sandbox Evasion Ram checkβ138Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploitβ41Updated last year
- Linux Sleep Obfuscationβ105Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.β114Updated 3 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, anβ¦β180Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β64Updated 2 years ago
- Attacking the cleanup_module function of a kernel moduleβ41Updated 2 months ago
- User Mode Windows Rootkitβ65Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantationβ71Updated last year
- Rex Shellcode Loader for AV/EDR evasionβ34Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ38Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.β112Updated last year
- Offensive Windows Kernel Toolsetβ126Updated 2 months ago
- Splitting and executing shellcode across multiple pagesβ101Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)β83Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing Rβ¦β58Updated 2 years ago
- API Hammering with C++20β49Updated 3 years ago
- Template-based generation of shellcode loadersβ79Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exeβ106Updated last year