brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆25Updated 3 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆39Updated 8 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 8 months ago
- ☆56Updated 9 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆104Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆94Updated 10 months ago
- Collection of red team techniques.☆58Updated 3 months ago
- Linux Sleep Obfuscation☆105Updated last year
- POC of GITHUB simple C2 in rust☆53Updated last week
- Create Anti-Copy DRM Malware☆60Updated 11 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆46Updated 2 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 8 months ago
- ☆144Updated 9 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆55Updated 6 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 9 months ago
- Rex Shellcode Loader for AV/EDR evasion☆33Updated last year
- Attacking the cleanup_module function of a kernel module☆39Updated last month
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆76Updated 3 months ago
- Windows Kernel Offensive Toolset☆125Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated 11 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆48Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆85Updated 3 months ago
- Backdooring VSCode Projects☆76Updated 2 months ago
- This is a simple process injection made in C for Linux systems☆27Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year