Level 2A - A hint for Antidetect(VirtualBox) to defeat Real Time Stamp Counters detection (ex Pafish)
☆25Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for antiRTSC
Users that are interested in antiRTSC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenVPN road warrior installer for Debian, Ubuntu and CentOS☆12Dec 15, 2018Updated 7 years ago
- Level 2B - OS unique identifiers spoof☆82Apr 20, 2019Updated 6 years ago
- Simple script that protects you from the Font Fingerprint technique☆34Mar 26, 2019Updated 7 years ago
- Forward all telemetry data through Proxy☆11Mar 9, 2019Updated 7 years ago
- Source code of Firefox-based Antidetect browser. Project is not maintained, aside of critical vulnerabilities in devtools, and requires a…☆92Jul 17, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆21Sep 6, 2018Updated 7 years ago
- Sandboxie Python Client☆24Jun 29, 2012Updated 13 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆11May 17, 2023Updated 2 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- ☆15Dec 26, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Antidetect source code. Protection from detection.☆28Nov 11, 2018Updated 7 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- ☆15Aug 7, 2020Updated 5 years ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- Likes WinIO library( http://www.internals.com/utilities_main.htm ),but WinIO library only support PS/2 keyboard, if you use USB keyboard,…☆15Feb 2, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆10Oct 22, 2017Updated 8 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- ☆10Aug 1, 2024Updated last year
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- android-protector☆18Apr 13, 2018Updated 7 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Jun 29, 2015Updated 10 years ago