brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆26Updated 7 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 11 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆60Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- Collection of red team techniques.☆62Updated 6 months ago
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 9 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Things i do because i saw it on twitter on a weekend☆56Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 6 months ago
- Backdooring VSCode Projects☆80Updated 5 months ago
- Linux Sleep Obfuscation☆105Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 11 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 4 months ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆65Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Create Anti-Copy DRM Malware☆68Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 6 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- ☆37Updated 7 months ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- Demoting PPL anti-malware services to less than a guest user☆64Updated 9 months ago