Cracked5pider / RhaastView external linksLinks
doesnt work and wont work on it anymore
☆10Jul 8, 2024Updated last year
Alternatives and similar repositories for Rhaast
Users that are interested in Rhaast are comparing it to the libraries listed below
Sorting:
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 9 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- ☆39Jun 10, 2023Updated 2 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- Demo from the Malware Analysis and Development Webinar☆23Apr 17, 2024Updated last year
- ☆26Aug 5, 2025Updated 6 months ago
- A BOF that's a BOF Loader and more☆196Jan 17, 2026Updated 3 weeks ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- GraalVM NativeImage Decompilation/Reverse Tool☆26Jan 21, 2024Updated 2 years ago
- ☆21Feb 22, 2025Updated 11 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- ☆48Nov 26, 2025Updated 2 months ago
- 一个demo☆23Apr 2, 2024Updated last year
- ForsHops☆59Mar 25, 2025Updated 10 months ago
- A COFF Loader written in Rust☆135Dec 1, 2025Updated 2 months ago
- ☆38Apr 15, 2025Updated 10 months ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 10 months ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- ☆124Mar 23, 2025Updated 10 months ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 10 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- early cascade injection PoC based on Outflanks blog post☆236Nov 7, 2024Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆156Mar 26, 2025Updated 10 months ago
- ☆12Feb 4, 2025Updated last year
- about how to make a anti-virus engine☆106May 22, 2025Updated 8 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆150Nov 23, 2025Updated 2 months ago
- ☆40Feb 4, 2023Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- ☆37May 8, 2022Updated 3 years ago
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated 3 weeks ago