brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆25Updated 6 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 10 months ago
- ☆58Updated 11 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆115Updated last week
- Attacking the cleanup_module function of a kernel module☆46Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆59Updated 5 months ago
- Collection of red team techniques.☆61Updated 5 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 5 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 3 months ago
- Linux Sleep Obfuscation☆106Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 10 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- EvtPsst☆55Updated last year
- ☆146Updated 11 months ago
- Things i do because i saw it on twitter on a weekend☆49Updated 2 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆56Updated 8 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 2 months ago
- This is a simple process injection made in C for Linux systems☆28Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆80Updated 5 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆113Updated 2 years ago
- ☆108Updated 11 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆74Updated last month
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆124Updated 9 months ago
- Create Anti-Copy DRM Malware☆66Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- Backdooring VSCode Projects☆79Updated 4 months ago