Handle-Ripper
Nidhogg
Handle-Ripper | Nidhogg | |
---|---|---|
2 | 9 | |
189 | 1,609 | |
- | - | |
10.0 | 8.1 | |
over 1 year ago | 27 days ago | |
C++ | C++ | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Handle-Ripper
- Windows handle hijacker
-
PoC of Handle hijacking technique
Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system without permission. It is a type of privilege escalation attack in which a malicious user takes control of an object handle, which is an identifier that is used to reference a system object, such as a file, a directory, a process, or an event. This allows the malicious user to gain access to resources that should be inaccessible to them ,check it out. https://github.com/ZeroMemoryEx/Handle-Ripper
Nidhogg
-
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
This is not an exploit nor an example about how to write a driver and I didn't write anywhere about an exploit or how to write an driver. If you are looking for these kind of resources, feel free to check out my driver programming blog series "Lord of the Ring0" (and a talk that will be released soon! :) ): https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
- Release Version 0.4 Release - Nidhogg - The goal of Nidhogg is to provide an all-in-one and easy-to-use rootkit with multiple helpful functionalities for red team engagements that can be integrated with your C2 framework via a single header file - this version introduced various new capabilities
- Nidhogg: Nidhogg is an all-in-one simple to use rootkit for red teams.
-
Lord Of The Ring0 (Part 2) - Lessons Learned Developing the Nidhogg Rootkit
Part 1
- Nidhogg: Nidhogg is an all-in-one simple to use rootkit for red teams. Nidhogg can work on any version of Windows 10 and Windows 11.
- Nidhogg: Nidhogg is an all-in-one simple to use rootkit for red teams. Nidhogg can work on any version of Windows 10 and Windows 11. - in reality this is a userland implant
- Nidhogg rootkit - An all in one rootkit for all windows 10 versions and windows 11 that can be managed with single hpp file
What are some alternatives?
Cronos-Rootkit - Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
PowerShell-Red-Team - Collection of PowerShell functions a Red Teamer may use in an engagement
Sandman - Sandman is a NTP based backdoor for red team engagements in hardened networks.
Inline-Execute-PE - Execute unmanaged Windows executables in CobaltStrike Beacons
boom-os - This is an x64 OS barely at development stages with hobbyist goals
CVE-2020-15368 - CVE-2020-15368, aka "How to exploit a vulnerable driver"
GRFICSv2 - Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Amsi-Killer - Lifetime AMSI bypass
NtSymbol - Resolve DOS MZ executable symbols at runtime
Machinegun - Machinegun is an advanced version of Metasploit's railgun, capable of reliably running arbitrary Windows API functions on a remote computer and getting the results to the attacker's machine.
fsfilter-rs - Experimental: A rust library to monitor filesystem 🪛 and more in windows
Venom - Venom is a library that meant to perform evasive communication using stolen browser socket