Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/xaff-xaff/black-angel-rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
https://github.com/xaff-xaff/black-angel-rootkit
ring0 rootkit windows x64
Last synced: 6 days ago
JSON representation
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
- Host: GitHub
- URL: https://github.com/xaff-xaff/black-angel-rootkit
- Owner: XaFF-XaFF
- License: gpl-3.0
- Created: 2023-03-18T14:42:13.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2023-11-09T14:16:24.000Z (12 months ago)
- Last Synced: 2024-10-12T14:12:05.605Z (26 days ago)
- Topics: ring0, rootkit, windows, x64
- Language: C++
- Homepage:
- Size: 173 KB
- Stars: 618
- Watchers: 9
- Forks: 102
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: License
Awesome Lists containing this project
README
Black Angel Rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
Designed for Red Teams.
## Rootkit Features
Rootkit can be loaded with [kdmapper](https://github.com/TheCruZ/kdmapper) to bypass DSE, Black Angel Loader may not be working properly yet. Project [driver-hijack](https://github.com/not-wlan/driver-hijack) is used to maintain full driver functionality such as callback support.
- DSE Bypass (No need to turn test signing on)
- ~~KPP Bypass~~
- Hide processes
- Hide ports (TCP/UDP)
- Process permission elevation
- Process protection
- Shellcode injector (Unkillable shellcode. Even if process dies, shellcode can still run)
- (TODO) Hide files/directories
- (TODO) Hide registry keys## Implementation
You can easily implement rootkit calls by copying and pasting [BlackAngel header](https://github.com/XaFF-XaFF/Black-Angel-Rootkit/blob/master/Black%20Angel%20Client/BlackAngel.hpp) file into your project.## Demonstration
You can find rootkit demonstration on my [channel](https://www.youtube.com/watch?v=YN5A-d0iljI)## Additional Info
- Remember to change [ACTIVE_PROCESS_LINKS](https://github.com/XaFF-XaFF/Black-Angel-Rootkit/blob/f4a5c762ae864b7395a6a03b8d46fdeda6a8bb25/Black%20Angel%20Rootkit/rootkit.hpp#L7) offset corresponding to your Windows versions. Current offset has been tested on Windows 10/11 Pro 21H2.
- There may still be stability issues!
- KM shellcode injector is OP. If you inject shellcode into protected process, no antivirus will remove it >:D Simple shellcodes such as Metasploit shell_reverse_tcp are able to work even if process is terminated.## Resources:
- [kdmapper](https://github.com/TheCruZ/kdmapper)
- [driver-hijack](https://github.com/not-wlan/driver-hijack)
- [Cronos-Rootkit](https://github.com/XaFF-XaFF/Cronos-Rootkit)