brosck / RebellionLinks
「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x
☆25Updated 3 months ago
Alternatives and similar repositories for Rebellion
Users that are interested in Rebellion are comparing it to the libraries listed below
Sorting:
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆38Updated 7 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 7 months ago
- ☆55Updated 8 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆95Updated 9 months ago
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆41Updated 2 months ago
- Backdooring VSCode Projects☆74Updated last month
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 5 months ago
- Create Anti-Copy DRM Malware☆59Updated 10 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 5 months ago
- Linux Sleep Obfuscation☆103Updated last year
- ☆34Updated 3 months ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 weeks ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆74Updated 2 months ago
- Reports on Driver, LSASS and other security services mitigations☆24Updated last week
- Collection of red team techniques.☆56Updated 2 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Rex Shellcode Loader for AV/EDR evasion☆33Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 2 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 7 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- Mockingjay process self injection POC☆35Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago