klecko / RootkitLinks
Let's try to create a rootkit!
☆20Updated 5 years ago
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Reverse shell macro using Word VBA☆15Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Updated 2 months ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- A Linux RAT in C☆35Updated 6 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Injects shellcode into remote processes using direct syscalls☆79Updated 4 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago