ret2win / siph0n-rootkitLinks
☆16Updated 5 years ago
Alternatives and similar repositories for siph0n-rootkit
Users that are interested in siph0n-rootkit are comparing it to the libraries listed below
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- AMSI detection PoC☆31Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- ☆28Updated 6 years ago
- ☆24Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- Work in Progress repo☆15Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated 4 months ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- ☆28Updated 7 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago