「⚠️」Performing a BYOVD on the truesight.sys driver
☆45Dec 7, 2024Updated last year
Alternatives and similar repositories for L1LKiller
Users that are interested in L1LKiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆61Dec 7, 2024Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆165Dec 7, 2024Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- Port of Cobalt Strike's Process Inject Kit☆193Dec 1, 2024Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆287Apr 23, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Mar 10, 2025Updated last year
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆95Apr 23, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Convert VBS file to EXE☆17May 17, 2025Updated 11 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- ☆28Aug 24, 2025Updated 8 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Feb 28, 2025Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆376Aug 29, 2025Updated 8 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆122Sep 8, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆116Sep 29, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- ☆36May 27, 2024Updated last year
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 8 months ago
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 10 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆44Oct 30, 2024Updated last year
- ☆19Sep 1, 2025Updated 8 months ago