brosck / FrostyView external linksLinks
「🧊」Ring 3 Rootkit for Windows 10
☆60Dec 7, 2024Updated last year
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated 11 months ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Apr 18, 2023Updated 2 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated 10 months ago
- ☆14Jul 20, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- A kernel-mode rootkit with remote control☆221Nov 13, 2020Updated 5 years ago
- Wolfy AV Bypasser☆29Feb 8, 2023Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Aug 16, 2024Updated last year
- SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates☆14Jun 16, 2023Updated 2 years ago
- ☆33Sep 10, 2025Updated 5 months ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆185Nov 10, 2023Updated 2 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- ☆17Jan 7, 2022Updated 4 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated 11 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Sep 29, 2023Updated 2 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last week
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A C2 framework inspired by anime, made in python.☆12Updated this week
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Shaco is a linux agent for havoc☆169Oct 25, 2023Updated 2 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Force a file delete using a windows kernel driver☆72Jul 29, 2022Updated 3 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- yet another hidden LKM hunter☆31Sep 18, 2025Updated 4 months ago
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year