reveng007 / reveng_rtkitView external linksLinks
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
☆265Dec 6, 2025Updated 2 months ago
Alternatives and similar repositories for reveng_rtkit
Users that are interested in reveng_rtkit are comparing it to the libraries listed below
Sorting:
- Red-Team LKM☆633Dec 16, 2025Updated 2 months ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,202Feb 1, 2026Updated 2 weeks ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,257Jan 24, 2026Updated 3 weeks ago
- awesome-linux-rootkits☆2,023Updated this week
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆723Aug 5, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆181Feb 10, 2023Updated 3 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,937Apr 7, 2024Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆563Sep 12, 2023Updated 2 years ago
- A stealth-focused C2 designed by Linux users for Linux environments, with native support for Windows and Linux BOFs.☆1,685Updated this week
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆934Mar 29, 2022Updated 3 years ago
- Linux Kernel Hacking☆748Apr 10, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Mar 23, 2023Updated 2 years ago
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆575Jun 5, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 4 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Jan 2, 2023Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆901Jul 20, 2024Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,091Feb 8, 2026Updated last week
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,023Jan 23, 2026Updated 3 weeks ago
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆360Mar 2, 2024Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆258Jun 29, 2024Updated last year
- C# Reflective loader for unmanaged binaries.☆447Jan 25, 2023Updated 3 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆52Sep 20, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Feb 2, 2026Updated 2 weeks ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,294Mar 21, 2025Updated 10 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago