klecko / Rootkit
Let's try to create a rootkit!
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Rootkit
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- C2 and Post Exploitation Code☆34Updated 3 weeks ago
- A simple injector that uses LoadLibraryA☆16Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Bypass Windows defender syscall☆18Updated 3 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago
- ☆16Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆33Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- A Linux RAT in C☆32Updated 6 years ago
- adding a backdooruser using win32api☆79Updated 4 years ago