brosck / FrostyLinks
γπ§γRing 3 Rootkit for Windows 10
β60Updated last year
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- Bypass Malware Sandbox Evasion Ram checkβ141Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privilegesβ134Updated 2 years ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- BYOVD Technique Example using viragt64 driverβ65Updated last year
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β70Updated last year
- Windows AppLocker Driver (appid.sys) LPEβ71Updated last year
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ26Updated 9 months ago
- Splitting and executing shellcode across multiple pagesβ103Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in Cβ135Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ72Updated 2 years ago
- Various methods of executing shellcodeβ73Updated 2 years ago
- β50Updated 3 years ago
- XOR decrypting shellcode using the GPU with OpenCL.β118Updated 7 months ago
- Rex Shellcode Loader for AV/EDR evasionβ35Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, anβ¦β184Updated 2 years ago
- Create Anti-Copy DRM Malwareβ70Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.β25Updated last year
- Linux Sleep Obfuscationβ107Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploitβ41Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)β83Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exeβ113Updated last year
- Persistence via Shell Extensionsβ63Updated 2 years ago
- using the gpu to hide your payloadβ63Updated 3 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β66Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loaderβ64Updated 2 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.β65Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)β74Updated 2 weeks ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.β124Updated last month
- PE obfuscator with Evasion in mindβ214Updated 2 years ago