bytecode77 / r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
β1,864Updated last week
Alternatives and similar repositories for r77-rootkit:
Users that are interested in r77-rootkit are comparing it to the libraries listed below
- Converts PE into a shellcodeβ2,504Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.β899Updated 3 years ago
- πΊπ¦ Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etcβ1,889Updated 2 years ago
- AV/EDR evasion via direct system calls.β1,856Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcodeβ2,253Updated last year
- AV/EDR evasion via direct system calls.β1,622Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.β1,920Updated 2 weeks ago
- Stealing Signatures and Making One Invalid Signature at a Timeβ2,204Updated 3 years ago
- Reflective PE packer.β1,267Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memβ¦β3,828Updated 5 months ago
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UIβ676Updated 4 months ago
- Antivirus evasion projectβ1,094Updated 2 months ago
- Alternative Shellcode Execution Via Callbacksβ1,544Updated 2 years ago
- Open-Source Shellcode & PE Packerβ1,927Updated last year
- C/C++ source obfuscator for antivirus bypassβ1,028Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β1,128Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memβ¦β3,263Updated this week
- Original C Implementation of the Hell's Gate VX Techniqueβ1,020Updated 3 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.β1,391Updated 8 months ago
- This program is designed to demonstrate various process injection techniquesβ1,127Updated last year
- x64 binary obfuscatorβ1,801Updated last year
- Run a Exe File (PE Module) in memory (like an Application Loader)β883Updated 4 years ago
- A tool to kill antimalware protected processesβ1,427Updated 3 years ago
- Collection of various malicious functionality to aid in malware developmentβ1,624Updated last year
- Shikata ga nai (δ»ζΉγγͺγ) encoder ported into go with several improvementsβ1,667Updated last year
- A PowerShell script anti-virus evasion toolβ1,108Updated 2 years ago
- Now You See Me, Now You Don'tβ924Updated 3 months ago
- β485Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β1,299Updated 8 months ago
- A modern 32/64-bit position independent implant templateβ1,180Updated 2 weeks ago