☆138Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for CreateFile_based_rootkit
Users that are interested in CreateFile_based_rootkit are comparing it to the libraries listed below
Sorting:
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- ☆826Dec 28, 2019Updated 6 years ago
- Phantom DLL hollowing PoC☆370May 23, 2022Updated 3 years ago
- ☆508Nov 21, 2020Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆824Mar 10, 2022Updated 3 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 5 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆722Aug 5, 2020Updated 5 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆108Jan 3, 2021Updated 5 years ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆349Jul 3, 2022Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- Example code for EDR bypassing☆151Mar 7, 2019Updated 6 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆362Feb 24, 2023Updated 3 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated last year
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Apr 11, 2022Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Stealthy backdoor for Windows operating systems☆283Feb 13, 2020Updated 6 years ago
- A Pin Tool for tracing API calls etc☆1,620Feb 8, 2026Updated 2 weeks ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- C# Implementation of the Hell's Gate VX Technique☆216Jun 30, 2020Updated 5 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago