brosck / Rebellion
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆23Updated last week
Alternatives and similar repositories for Rebellion:
Users that are interested in Rebellion are comparing it to the libraries listed below
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 4 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 4 months ago
- ☆54Updated 5 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Impersonate Tokens using only NTAPI functions☆54Updated 2 weeks ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 8 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 4 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated last month
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆39Updated 8 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆31Updated last year
- Dump Linux keyrings☆19Updated 9 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆35Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆21Updated 2 months ago
- Research into WinSxS binaries and finding hijackable paths☆28Updated last week
- ☆20Updated last month
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- converts sRDI compatible dlls to shellcode☆23Updated 2 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆53Updated 2 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year