maezyn / dolosLinks
Metamorphic engine written in Rust.
☆17Updated 3 years ago
Alternatives and similar repositories for dolos
Users that are interested in dolos are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆106Updated 2 years ago
- Various Process Injection Techniques☆158Updated 3 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Admin to Kernel code execution using the KSecDD driver☆258Updated last year
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆43Updated last month
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated 2 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆150Updated 2 years ago
- A tutorial on how to write a packer for Windows!☆291Updated last year
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆49Updated last week
- Process Injection using Thread Name☆281Updated 5 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 3 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆315Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆221Updated 5 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆116Updated 2 months ago
- Collection of hypervisor detections☆272Updated last year
- Rewrite and obfuscate code in compiled binaries☆259Updated 3 weeks ago
- ☆265Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆524Updated 6 months ago
- ☆47Updated 2 years ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆234Updated 11 months ago
- x86 PE Mutator☆225Updated 2 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 4 months ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆171Updated 2 years ago
- WTSRM☆215Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆255Updated 3 years ago
- A simple Windows kernel rootkit.☆94Updated 5 months ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆183Updated 5 months ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆235Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆157Updated 2 years ago