coldpon / ring3-hiddenLinks
Hide processes, files, services in Windows ring3
☆26Updated last year
Alternatives and similar repositories for ring3-hidden
Users that are interested in ring3-hidden are comparing it to the libraries listed below
Sorting:
- shellcode生成框架☆88Updated last year
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆23Updated 4 months ago
- about how to make a anti-virus engine☆86Updated 3 months ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 2 years ago
- An implementation of an indirect system call☆129Updated 2 years ago
- ☆33Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated 2 years ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆138Updated 10 months ago
- Windows API Call Obfuscation☆109Updated 2 years ago
- Load static-compiled PE from remote server.☆64Updated 3 years ago
- 隐藏可执行内存☆262Updated 4 months ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆34Updated last year
- 简单安排一下 autochk.sys 这个rootkit☆73Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆36Updated last month
- Shellcode obfuscation tool to avoid AV/EDR.☆128Updated last year
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 2 months ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- Windows 常用版本内核文件收集☆10Updated last year
- A C Implementation for Bypassing Security Software☆27Updated 4 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆65Updated 2 weeks ago
- X86 Packer with Portable Executable compatibility.☆56Updated this week
- Windows PE Signature Thief in C++☆50Updated 5 years ago
- shellcode-loaders and beacon-loaders☆70Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆162Updated 2 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Updated 7 months ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- 内核级别隐藏指定窗口☆318Updated 3 years ago
- shellcode 生成框架☆278Updated 3 years ago
- 无痕注入1☆76Updated 4 years ago