Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
How to Detect and Analyze Rootkits on Linux and Windows: Best Practices for Security Professionals
Rootkits are among the most insidious forms of malware. They operate at the lowest levels of an operating system, making them difficult to detect, remove, and analyze. In this article, we will...
Comprehensive Guide to Malware Types: Understanding and Defending Against Cyber Threats
Introduction
Malware is one of the most persistent threats in cybersecurity, and it continues to evolve in complexity. With new strains and attack methods constantly emerging, understanding the types of...
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
Designed for Red Teams.
Rootkit Features
Rootkit can be loaded with kdmapper to bypass DSE, Black Angel Loader may not be working properly yet. Project...
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
Features
Hide process
Elevate process permissions
Protect process
Hidden content
Ring 3 rootkit
r77 is a ring 3 Rootkit that hides the following entities from all processes:
Files, directories, named pipes, scheduled tasks
Processes
CPU usage
Registry keys & values
TCP & UDP connections
It is compatible with Windows 7 and Windows 10 in both...
A Python 3 standalone Windows 10 / Linux Rootkit. The networking communication get’s established over the tor network.
Features
Standalone executable, including python interpreter and tor
The executable has a size of ~13MB on Windows and ~7MB on Linux
the whole communication works...
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Ring 3 rootkit
r77 is a ring 3 Rootkit that hides following entities from all processes:
Files, directories, junctions, named pipes, scheduled tasks
Processes
CPU usage...
AntiSpy
A powerful anti rootkit toolkit
AntiSpy is a free but powerful anti virus and rootkits toolkit.
It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.
With its assistance,you can easily spot and...
Hi peeps long time hope everyones well :)
recently bought a mac and got into rooting again when i get 5 here and there lol Problem ive only got the knowlage on linux systems now on recon exploit privilidge root and then drop kit and clean ( My Kogs are rusty in command prompt cmd not terminal...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.