joaoviictorti / shadowLinks
Windows Kernel Rootkit in Rust
☆673Updated 3 months ago
Alternatives and similar repositories for shadow
Users that are interested in shadow are comparing it to the libraries listed below
Sorting:
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆573Updated 2 years ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆486Updated last week
- Centralized resource for listing and organizing known injection techniques and POCs☆667Updated last month
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆560Updated 2 years ago
- Because AV evasion should be easy.☆847Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆580Updated 5 months ago
- Evasion by machine code de-optimization.☆413Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆385Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆896Updated this week
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆511Updated 3 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆288Updated 2 weeks ago
- Now You See Me, Now You Don't☆1,015Updated last week
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆40Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆373Updated 6 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆315Updated 6 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,000Updated last week
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,234Updated 2 years ago
- Performing Indirect Clean Syscalls☆596Updated 2 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆356Updated last year
- Dynamically invoke arbitrary unmanaged code☆356Updated last year
- Shoggoth: Asmjit Based Polymorphic Encryptor☆772Updated last year
- PoCs for Kernelmode rootkit techniques research.☆424Updated 2 months ago
- Evasive shellcode loader☆398Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆749Updated 5 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆669Updated 2 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆398Updated last year
- Shellcode loader generator with multiples features☆506Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆588Updated last year