ciyze0101 / Windows-Rootkits
☆485Updated 4 years ago
Alternatives and similar repositories for Windows-Rootkits:
Users that are interested in Windows-Rootkits are comparing it to the libraries listed below
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆695Updated 4 years ago
- ☆807Updated 5 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆599Updated 2 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆665Updated 6 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆491Updated 7 years ago
- Research on Anti-malware and other related security solutions☆258Updated 4 years ago
- Obfuscate specific windows apis with different apis☆998Updated 4 years ago
- 💉 DLL/Shellcode injection techniques☆702Updated 6 years ago
- Mirror of users section of rootkit.com☆292Updated 8 years ago
- A kernel-mode rootkit with remote control☆209Updated 4 years ago
- A small bootkit which does not rely on x64 assembly.☆476Updated 5 years ago
- Code that allows running another windows PE in the same address space as the host process.☆440Updated 8 years ago
- A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)☆407Updated 10 months ago
- A memory scanning evasion technique☆861Updated 7 years ago
- Universal Unhooking☆319Updated 6 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆806Updated 3 years ago
- Demos of various injection techniques found in malware☆792Updated 3 years ago
- Shellcode Compiler☆1,090Updated 7 months ago
- 🛡️ Obfuscator, Encryption, Junkcode, Anti-Debug, PE protection/modification☆511Updated 7 years ago
- zeus-style banking trojan☆443Updated 7 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆508Updated 5 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆882Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,852Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆652Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,206Updated 11 months ago
- Windows NT x64 syscall fuzzer☆598Updated last year
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆557Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,251Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆930Updated 2 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆595Updated 7 years ago