「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆26Apr 10, 2025Updated last year
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 9 months ago
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 10 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- ☆32Sep 10, 2025Updated 7 months ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆110Jan 18, 2026Updated 3 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- ☆13Dec 27, 2014Updated 11 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Mar 10, 2025Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year