ldpreload / BlackLotusLinks
BlackLotus UEFI Windows Bootkit
☆2,098Updated last year
Alternatives and similar repositories for BlackLotus
Users that are interested in BlackLotus are comparing it to the libraries listed below
Sorting:
- Collection of various malicious functionality to aid in malware development☆1,715Updated last year
- x64 binary obfuscator☆1,872Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,048Updated this week
- EDR Lab for Experimentation Purposes☆1,320Updated 3 weeks ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆543Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆912Updated 3 years ago
- Living Off The Land Drivers☆1,258Updated this week
- Now You See Me, Now You Don't☆959Updated 7 months ago
- Win32 and Kernel abusing techniques for pentesters☆958Updated last year
- kill anti-malware protected processes ( BYOVD ) ( Microsoft Won )☆954Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,144Updated last year
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,031Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆642Updated last year
- A modern 32/64-bit position independent implant template☆1,247Updated 4 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated last year
- Converts a EXE into DLL☆1,336Updated 3 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,083Updated 4 years ago
- Stop Windows Defender programmatically☆980Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,514Updated last month
- Research code & papers from members of vx-underground.☆1,275Updated 3 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,338Updated 10 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,261Updated last month
- Because AV evasion should be easy.☆778Updated 8 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,979Updated 2 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,194Updated last year
- The essential toolkit for reversing, malware analysis, and cracking☆906Updated 2 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,384Updated last year
- Converts PE into a shellcode☆2,611Updated last year
- Portable Executable reversing tool with a friendly GUI☆3,216Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,886Updated 4 months ago