ldpreload / BlackLotus
BlackLotus UEFI Windows Bootkit
☆1,969Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for BlackLotus
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,781Updated last month
- x64 binary obfuscator☆1,709Updated last year
- Collection of various malicious functionality to aid in malware development☆1,493Updated 8 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆519Updated last year
- kill anti-malware protected processes ( BYOVD) (Microsoft Won )☆897Updated last year
- The essential toolkit for reversing, malware analysis, and cracking☆719Updated 3 months ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆855Updated 2 years ago
- CVE-2023-38831 winrar exploit generator☆778Updated 11 months ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆623Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,651Updated last week
- Portable Executable reversing tool with a friendly GUI☆2,752Updated 2 weeks ago
- Win32 and Kernel abusing techniques for pentesters☆919Updated last year
- ☆1,879Updated 6 months ago
- SoftICE-like kernel debugger for Windows 11☆929Updated last year
- Little user-mode AV/EDR evasion lab for training & learning purposes☆994Updated 6 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆923Updated last year
- Living Off The Land Drivers☆1,030Updated last month
- This is a repository of resource about Malware techniques☆636Updated last year
- ☆894Updated 3 months ago
- A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.☆396Updated last year
- Converts a EXE into DLL☆1,265Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆924Updated this week
- Now You See Me, Now You Don't☆853Updated 3 weeks ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆884Updated last year
- UAC bypass for x64 Windows 7 - 11☆792Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆952Updated 11 months ago
- x64 Dynamic Reverse Engineering Toolkit☆596Updated last year
- Ready to go Phishing Platform☆858Updated 3 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,148Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,332Updated 11 months ago