ldpreload / BlackLotusLinks
BlackLotus UEFI Windows Bootkit
☆2,160Updated last year
Alternatives and similar repositories for BlackLotus
Users that are interested in BlackLotus are comparing it to the libraries listed below
Sorting:
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,182Updated last month
- x64 binary obfuscator☆1,939Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,822Updated last year
- kill anti-malware protected processes ( BYOVD ) ( Microsoft Won )☆968Updated 2 years ago
- The essential toolkit for reversing, malware analysis, and cracking☆955Updated 7 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆560Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆3,435Updated 2 months ago
- Living Off The Land Drivers☆1,355Updated 3 weeks ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,045Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,065Updated 3 weeks ago
- Win32 and Kernel abusing techniques for pentesters☆971Updated 2 years ago
- Now You See Me, Now You Don't☆1,010Updated last week
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆648Updated 2 years ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,454Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆932Updated 3 years ago
- EDR Lab for Experimentation Purposes☆1,399Updated 2 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,144Updated 4 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,230Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Updated 2 years ago
- Converts a EXE into DLL☆1,355Updated 3 months ago
- Stop Windows Defender programmatically☆997Updated 3 years ago
- CVE-2023-38831 winrar exploit generator☆789Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,279Updated 9 months ago
- x64 Dynamic Reverse Engineering Toolkit☆724Updated 2 years ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆344Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,595Updated last month
- ☆1,769Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,436Updated 2 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,037Updated 2 years ago
- UAC bypass for x64 Windows 7 - 11☆826Updated 3 years ago