-
Tested on Windows x86_64 1909, local.
-
Tested on VMWare Player 15, machine: Windows x86_64 1909, local: Ubuntu 19.10.
- @cristeigabriel or any of the people listed below are not responsible for any action that's to happen due to this project being published. The code is distributed for learning purposes.
windowsrootkit is a rootkit that's supposed to be compiled as a DLL (Dynamic Library Link) and to be injected within any process that can handle it. It can hook WinApi functions, keylog, take screenshots, and more to come... It is NOT set up to send data to a server, and won't be, to avoid possible cyber attacks made by people with no knowledge.
Due to it's nature, which is, being an injected DLL, unless there's a 'counter attack' on the functions used to inject it into any module, there's no way, whatsoever, to find out if the malware is indeed running, thus, it makes actions like spying, or just general hacking, easier. Currently, no anti-virus detects these actions. This CAN be embed into any DLL project that runs on the C++17 language standard. It also provides an obfuscation engine out of the box (that's not meant to take the place of any other obfuscation tool, it's just to make reverse engineering harder by default, or general detection). It also has cryptology tools, i.e. a heavily obfuscated version of XOR encryption [compile time], a FNV-1a algorithm that works with multiple datatypes [run time].
- APIHook by @Zer0Mem0ry
- Heavily Vectorized XOR by @JustasMasiulis
- Obfusion by @kgretzky
- windowsrootkit is licensed under the GPL v2 license. Read more about it online.