CX330Blake / Black-Hat-ZigView external linksLinks
This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡
☆195Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for Black-Hat-Zig
Users that are interested in Black-Hat-Zig are comparing it to the libraries listed below
Sorting:
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆73Aug 5, 2025Updated 6 months ago
- ☆17Jan 4, 2026Updated last month
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆94Nov 7, 2025Updated 3 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138May 30, 2022Updated 3 years ago
- Generate Proxy DLLs in Rust☆47Sep 2, 2025Updated 5 months ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 5 months ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last week
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆293Feb 9, 2026Updated last week
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- ☆11Nov 12, 2023Updated 2 years ago
- A stager and implant that executes remote Web Assembly☆33Feb 4, 2026Updated last week
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆104Updated this week
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 6 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Tiny Linux "Hello, World!"☆14Dec 30, 2023Updated 2 years ago
- A compiler for microarchitectural weird machines☆18Aug 10, 2024Updated last year
- ☆14Dec 26, 2024Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆76Feb 10, 2026Updated last week
- A community-driven collection of BloodHound queries☆160Jan 29, 2026Updated 2 weeks ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated 11 months ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 5 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- 爛清大,給我電☆20Oct 18, 2023Updated 2 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 3 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated 11 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year