maezyn / dolosLinks
Metamorphic engine written in Rust.
☆16Updated 3 years ago
Alternatives and similar repositories for dolos
Users that are interested in dolos are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆105Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆89Updated last year
- Various Process Injection Techniques☆156Updated 3 years ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆274Updated last year
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆147Updated 2 years ago
- A tutorial on how to write a packer for Windows!☆289Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Process Injection using Thread Name☆277Updated 4 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆381Updated 5 months ago
- Rewrite and obfuscate code in compiled binaries☆226Updated this week
- Fileless attack with persistence☆360Updated 2 months ago
- Admin to Kernel code execution using the KSecDD driver☆255Updated last year
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆166Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆157Updated 2 years ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆187Updated last year
- Windows syscall SDK with dynamic offset resolution, validation, obfuscation, and multi language bindings. Bypass API hooks across differe…☆44Updated this week
- bypassing intel txt's tboot integrity checks via coreboot shim☆80Updated 5 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆315Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆231Updated 10 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆548Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆187Updated last month
- x86 PE Mutator☆225Updated 2 years ago
- A small x64 library to load dll's into memory.☆450Updated last year
- ☆47Updated 2 years ago
- Early Work on Abyss Windows UEFI Bootkit☆43Updated 3 weeks ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆218Updated 4 months ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆234Updated last year
- Exploitable drivers, you know what I mean☆154Updated last year