loneicewolf / LOJAX
LOJAX ROOTKIT (UEFI) +PDF Included[x]
☆29Updated last year
Alternatives and similar repositories for LOJAX:
Users that are interested in LOJAX are comparing it to the libraries listed below
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆105Updated last year
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated 10 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 4 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 4 months ago
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 4 years ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆87Updated last year
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆16Updated 3 weeks ago
- ☆34Updated 2 years ago
- ☆10Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆25Updated 5 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- Experiment with d_olex's firmware and conducting "preboot" attack☆15Updated last year
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆15Updated 3 months ago