Adaptix C2 agent using Crystal Palace PIC linker and PICO module system
☆80Mar 7, 2026Updated last month
Alternatives and similar repositories for Maverick
Users that are interested in Maverick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- An ARM64 Linux ELF Packer/Loader☆28Updated this week
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆205Dec 30, 2025Updated 4 months ago
- ☆46Jun 1, 2025Updated 11 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique☆173Apr 14, 2026Updated 3 weeks ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆120Mar 24, 2026Updated last month
- vm_str.hpp is a header only string obfuscator.☆113Aug 24, 2025Updated 8 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 3 months ago
- Optimized zlib inflate (+gzip) library for embedded☆40Jul 15, 2024Updated last year
- ☆53Oct 29, 2024Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆210Mar 4, 2026Updated 2 months ago
- Signature finder (from PE-bear)☆40Aug 25, 2025Updated 8 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- ASPX Web Shell with COFF Loader☆129Mar 10, 2026Updated last month
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 3 years ago
- A cross-platform C++ framework for building Windows shellcode☆172Apr 21, 2026Updated 2 weeks ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆132Dec 24, 2025Updated 4 months ago
- ☆49Apr 9, 2025Updated last year
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆349Mar 21, 2026Updated last month
- ☆66Dec 24, 2021Updated 4 years ago
- ☆70Feb 12, 2026Updated 2 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆120Jan 21, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆219Aug 21, 2025Updated 8 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Resolve offsets, gadgets and symbols from NTKernel☆61Jan 15, 2026Updated 3 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- Research project for understanding how Mimikatz work and become better at C☆123Oct 22, 2021Updated 4 years ago