eternalklaus / EternalAntirootkit
Anti-rootkit works as a Windows system driver.
☆13Updated 2 years ago
Related projects: ⓘ
- User-mode part of Zerokit platform☆20Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- A tool to show the method info at runtime☆12Updated 5 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 5 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- Zerokit shared code☆16Updated 5 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆10Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- Debugger checks in 3 ways☆19Updated 6 years ago
- Windows Malware Probe of Concept☆20Updated 2 years ago
- hooking KiUserApcDispatcher☆22Updated 7 years ago
- Windows hidden thread suspend POC with code injection☆12Updated 7 years ago
- ☆11Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆30Updated 5 years ago
- Zerokit server controller☆13Updated 5 years ago
- ☆13Updated this week
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Common Malware Techniques☆13Updated last year
- Access windows machine remotely on HTTP☆12Updated 3 years ago
- ☆24Updated this week
- ☆19Updated this week
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Kernel (Ring0) - SSDT unhook driver☆13Updated 6 years ago
- ☆12Updated this week
- ☆10Updated this week
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago