ldpreload / BlackLotusLinks
BlackLotus UEFI Windows Bootkit
☆2,085Updated last year
Alternatives and similar repositories for BlackLotus
Users that are interested in BlackLotus are comparing it to the libraries listed below
Sorting:
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,023Updated this week
- x64 binary obfuscator☆1,864Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,693Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆537Updated last year
- Now You See Me, Now You Don't☆953Updated 6 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,962Updated 2 weeks ago
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆952Updated last year
- Win32 and Kernel abusing techniques for pentesters☆958Updated last year
- Portable Executable reversing tool with a friendly GUI☆3,171Updated 2 months ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆642Updated last year
- Living Off The Land Drivers☆1,222Updated last week
- EDR Lab for Experimentation Purposes☆1,289Updated last week
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,023Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆911Updated 3 years ago
- Converts a EXE into DLL☆1,331Updated 2 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,134Updated last year
- A modern 32/64-bit position independent implant template☆1,234Updated 3 months ago
- The essential toolkit for reversing, malware analysis, and cracking☆900Updated last month
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,305Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,240Updated last month
- Process Hollowing (Malware Technique)☆1,341Updated 2 months ago
- Stop Windows Defender programmatically☆978Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,492Updated last month
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆673Updated 8 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,190Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆780Updated last week
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,194Updated last month
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,070Updated 4 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,366Updated last month