Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.
-
Updated
Jan 22, 2026 - C++
Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.
🛡️ Explore a simple Windows usermode rootkit for educational purposes, showcasing privilege escalation, stealth features, and remote management capabilities.
Add a description, image, and links to the usermode-rootkit topic page so that developers can more easily learn about it.
To associate your repository with the usermode-rootkit topic, visit your repo's landing page and select "manage topics."