ciyze0101 / Windows-Rootkits
☆480Updated 4 years ago
Alternatives and similar repositories for Windows-Rootkits:
Users that are interested in Windows-Rootkits are comparing it to the libraries listed below
- Kernel rootkit, that lives inside the Windows registry values data☆489Updated 7 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- ☆802Updated 5 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆654Updated 5 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆585Updated 2 years ago
- Obfuscate specific windows apis with different apis☆987Updated 3 years ago
- Code that allows running another windows PE in the same address space as the host process.☆434Updated 8 years ago
- A small bootkit which does not rely on x64 assembly.☆460Updated 5 years ago
- Mirror of users section of rootkit.com☆289Updated 8 years ago
- A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)☆396Updated 7 months ago
- A kernel-mode rootkit with remote control☆208Updated 4 years ago
- Windows NT x64 syscall fuzzer☆596Updated last year
- 💉 DLL/Shellcode injection techniques☆701Updated 5 years ago
- Shellcode Compiler☆1,082Updated 4 months ago
- A memory scanning evasion technique☆850Updated 7 years ago
- zeus-style banking trojan☆438Updated 7 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆851Updated 5 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,078Updated 5 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆298Updated 6 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,188Updated 8 months ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆387Updated 4 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆866Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆433Updated 4 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆637Updated 10 months ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆585Updated 7 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆522Updated 10 months ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆546Updated 3 years ago