klecko / Rootkit
Let's try to create a rootkit!
☆20Updated 4 years ago
Alternatives and similar repositories for Rootkit:
Users that are interested in Rootkit are comparing it to the libraries listed below
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last week
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Windows Exploit List☆17Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 2 years ago
- Bypass Windows defender syscall☆18Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated 10 months ago
- XOR crypt/decrypt using C#☆12Updated 4 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago