brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆27Updated 9 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- ☆59Updated last year
- ☆147Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- Windows AppLocker Driver (appid.sys) LPE☆72Updated last year
- Things i do because i saw it on twitter on a weekend☆57Updated 6 months ago
- Create Anti-Copy DRM Malware☆71Updated last year
- Collection of red team techniques.☆65Updated 9 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- Linux Sleep Obfuscation☆107Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- Attacking the cleanup_module function of a kernel module☆53Updated 6 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 9 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Updated 11 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62Updated 8 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago