ret2win / siph0n-rootkitLinks
☆16Updated 5 years ago
Alternatives and similar repositories for siph0n-rootkit
Users that are interested in siph0n-rootkit are comparing it to the libraries listed below
Sorting:
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- Work in Progress repo☆15Updated 6 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- ☆16Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- ☆28Updated 6 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆45Updated 7 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆24Updated 4 years ago
- Steal users password with a fake sudo function.☆42Updated last year
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- treafik fronted c2 examples☆26Updated 4 years ago