ret2win / siph0n-rootkitLinks
☆16Updated 6 years ago
Alternatives and similar repositories for siph0n-rootkit
Users that are interested in siph0n-rootkit are comparing it to the libraries listed below
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- AMSI detection PoC☆31Updated 5 years ago
- ☆28Updated 6 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Updated 5 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- Work in Progress repo☆15Updated 6 years ago
- ☆16Updated 5 years ago
- ☆24Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Various shell code I have written☆17Updated 5 years ago
- ☆11Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- ☆49Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Data EXfiltration TestER☆21Updated 6 years ago