brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆25Updated 2 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 6 months ago
- ☆55Updated 8 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆40Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 6 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Rex Shellcode Loader for AV/EDR evasion☆31Updated last year
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 4 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆39Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- A pure C version of SymProcAddress☆27Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Backdooring VSCode Projects☆63Updated 2 weeks ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- Unhook Ntdll.dll, Go & C++.☆24Updated 2 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year