brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆25Updated 5 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- ☆58Updated 10 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆42Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated 11 months ago
- Collection of red team techniques.☆59Updated 4 months ago
- Linux Sleep Obfuscation☆106Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- POC of GITHUB simple C2 in rust☆52Updated last month
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆110Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 7 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Attacking the cleanup_module function of a kernel module☆41Updated 2 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- Backdooring VSCode Projects☆79Updated 3 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆68Updated 3 weeks ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆80Updated 4 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 9 months ago
- This is a simple process injection made in C for Linux systems☆27Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- ☆34Updated 5 months ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 7 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 7 months ago
- Windows AppLocker Driver (appid.sys) LPE☆65Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆34Updated last year