ldpreload / BlackLotusLinks
BlackLotus UEFI Windows Bootkit
☆2,179Updated last year
Alternatives and similar repositories for BlackLotus
Users that are interested in BlackLotus are comparing it to the libraries listed below
Sorting:
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,202Updated last week
- x64 binary obfuscator☆1,958Updated 2 years ago
- kill anti-malware protected processes ( BYOVD )☆970Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,840Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆562Updated 2 years ago
- Now You See Me, Now You Don't☆1,025Updated 2 weeks ago
- Living Off The Land Drivers☆1,386Updated this week
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆933Updated 3 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,085Updated this week
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆671Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆3,475Updated 3 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,243Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,409Updated 3 weeks ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,045Updated last year
- Win32 and Kernel abusing techniques for pentesters☆972Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,159Updated 4 years ago
- The essential toolkit for reversing, malware analysis, and cracking☆968Updated 8 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,550Updated 3 months ago
- Converts PE into a shellcode☆2,733Updated 5 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated 2 years ago
- Converts a EXE into DLL☆1,360Updated 4 months ago
- A modern 32/64-bit position independent implant template☆1,294Updated 10 months ago
- Advanced VM detection library and tool☆1,026Updated this week
- A Pin Tool for tracing API calls etc☆1,612Updated 2 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆696Updated last year
- Research code & papers from members of vx-underground.☆1,351Updated 4 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,044Updated 3 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,307Updated 3 months ago
- Stop Windows Defender programmatically☆995Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆829Updated last week