ret2win / siph0n-rootkitLinks
☆16Updated 5 years ago
Alternatives and similar repositories for siph0n-rootkit
Users that are interested in siph0n-rootkit are comparing it to the libraries listed below
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 8 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- ☆45Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Automate AV evasion by calling AMSI☆86Updated 2 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 4 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- ☆28Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated 2 months ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago