klecko / Rootkit
Let's try to create a rootkit!
☆17Updated 4 years ago
Related projects: ⓘ
- ☆32Updated this week
- ☆42Updated this week
- ☆23Updated this week
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- A simple injector that uses LoadLibraryA☆15Updated 4 years ago
- Reverse shell macro using Word VBA☆13Updated 3 years ago
- ☆79Updated this week
- ☆12Updated this week
- ☆16Updated 3 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆34Updated 3 years ago
- Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]☆30Updated last year
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- ☆27Updated this week
- A curated list of tools and techniques written from experience in weaponization of malware☆33Updated 10 months ago
- ☆19Updated this week
- XOR crypt/decrypt using C#☆12Updated 3 years ago
- ☆17Updated this week
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 2 years ago
- ☆75Updated this week
- C2 and Post Exploitation Code☆34Updated 3 weeks ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 2 years ago
- Bypass Windows defender syscall☆17Updated 3 years ago
- Initial Commit of Coresploit☆55Updated 2 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated last year