h3xduck / UmbraLinks
A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
☆129Updated 4 years ago
Alternatives and similar repositories for Umbra
Users that are interested in Umbra are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit☆138Updated last year
- ☆37Updated 6 months ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- ☆55Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆62Updated 4 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- An evil bit backdoor for iptables☆54Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- Attacking the cleanup_module function of a kernel module☆42Updated 2 months ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆79Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last week
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- bdvl☆114Updated 3 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Updated 3 weeks ago
- Bypass Malware Time Delays☆104Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Compile shellcode into an exe file from Windows or Linux.☆69Updated 3 months ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- The AMSI server for Avred☆30Updated 2 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago