Adaptix C2 agent using Crystal Palace PIC linker and PICO module system
☆73Mar 7, 2026Updated last month
Alternatives and similar repositories for Maverick
Users that are interested in Maverick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆285Apr 8, 2026Updated last week
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆203Dec 30, 2025Updated 3 months ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆110Mar 24, 2026Updated 3 weeks ago
- vm_str.hpp is a header only string obfuscator.☆112Aug 24, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆156Mar 4, 2026Updated last month
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 2 months ago
- Optimized zlib inflate (+gzip) library for embedded☆40Jul 15, 2024Updated last year
- ☆53Oct 29, 2024Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆51Dec 22, 2025Updated 3 months ago
- ☆12Mar 18, 2026Updated 3 weeks ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Signature finder (from PE-bear)☆39Aug 25, 2025Updated 7 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- ASPX Web Shell with COFF Loader☆126Mar 10, 2026Updated last month
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆127Dec 23, 2025Updated 3 months ago
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆132Dec 24, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A cross-platform C++ framework for building Windows shellcode☆169Mar 4, 2026Updated last month
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- ☆49Apr 9, 2025Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆215Aug 21, 2025Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- ☆69Feb 12, 2026Updated 2 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆115Jan 21, 2026Updated 2 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lnk crafting and research tools☆159Mar 4, 2026Updated last month
- Resolve offsets, gadgets and symbols from NTKernel☆60Jan 15, 2026Updated 3 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆157Feb 14, 2026Updated 2 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆123Apr 6, 2026Updated last week
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 7 months ago
- ☆41Feb 20, 2025Updated last year