brosck / FrostyLinks
γπ§γRing 3 Rootkit for Windows 10
β59Updated 11 months ago
Alternatives and similar repositories for Frosty
Users that are interested in Frosty are comparing it to the libraries listed below
Sorting:
- Kernel Mode Driver for Elevating Process Privilegesβ134Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram checkβ141Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPEβ67Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.β117Updated 6 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β69Updated last year
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Create Anti-Copy DRM Malwareβ69Updated last year
- Rex Shellcode Loader for AV/EDR evasionβ34Updated last year
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ26Updated 7 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β65Updated 2 years ago
- Various methods of executing shellcodeβ72Updated 2 years ago
- Linux Sleep Obfuscationβ105Updated last year
- β50Updated 3 years ago
- BYOVD Technique Example using viragt64 driverβ61Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exeβ112Updated last year
- Basic interactive Windows kernel offensive toolkit written in Cβ133Updated 2 months ago
- β88Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ44Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.β50Updated last year
- Splitting and executing shellcode across multiple pagesβ103Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing Rβ¦β58Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".β88Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader featureβ101Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ72Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.β111Updated 2 years ago
- Persistence via Shell Extensionsβ63Updated 2 years ago
- using the gpu to hide your payloadβ62Updated 3 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sectionsβ122Updated 2 years ago
- Windows C++ Implant for Exploration C2β44Updated 3 weeks ago