singlefreshBird / RootkitLinks
Rookit and anti rookit on Windows platform
☆14Updated last year
Alternatives and similar repositories for Rootkit
Users that are interested in Rootkit are comparing it to the libraries listed below
Sorting:
- Load Dll into Kernel space☆39Updated 3 years ago
- ☆23Updated 2 years ago
- shadow tls☆17Updated 3 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆76Updated 3 years ago
- ☆29Updated 3 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12Updated last year
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 4 years ago
- Protected Process Light Library☆18Updated 5 years ago
- collection of code snippets,windbg,python scripts and resources☆14Updated 3 years ago
- ☆17Updated 2 years ago
- What makes it page☆17Updated 3 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆24Updated last year
- Walks through the 4-level paging structures in Windows x64☆13Updated 2 years ago
- Static Library For Windows Drivers☆41Updated last month
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆21Updated last year
- ☆23Updated 2 years ago
- ☆25Updated 4 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆36Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Updated 3 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Updated 2 years ago
- Helper functions for calculating the authenticode digest for a portable executable file☆21Updated 5 years ago