csurage / RootkitLinks
Windows Malware
☆41Updated 12 years ago
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- Gozi-MBR-rootkit Bootkit Modified☆69Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆51Updated 10 years ago
- Another dll injection tool.☆29Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- KINS Banking Trojan☆61Updated 10 years ago
- Various Crypter Project☆51Updated 11 years ago
- Power Loader botnet☆39Updated 10 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- inPEct means "infect", applicable to PE ("Portable Executable") format. It is an executable binder, thus, it's able to join two .exe file…☆21Updated 14 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- ☆12Updated 8 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- Carberp Banking Trojan☆114Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Bootkits Revisited☆41Updated 11 years ago
- Introduce you to shellcode development.☆23Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 9 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- Rovnix Bootkit☆118Updated 10 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago