HackLike-co / CloakLinks
Generate Secure, Polymorphic, Evasive (lol) Payloads
ā27Updated 2 months ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā92Updated 3 weeks ago
- PoC framework for Sliver compilationā23Updated 10 months ago
- ForsHopsā150Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.ā13Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.ā92Updated last week
- Lateral Movement Bof with MSI ODBC Driver Installā138Updated 2 months ago
- AzureAD beacon object filesā134Updated 3 weeks ago
- A python script that automates a C2 Profile buildā48Updated 3 months ago
- ā122Updated 8 months ago
- ā53Updated last month
- Generate an Alphabetical Polymorphic Shellcodeā131Updated 3 months ago
- ā135Updated 10 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rustā56Updated last year
- ā28Updated last year
- Internal Monologue BOFā79Updated 11 months ago
- A collection of position independent coding resourcesā100Updated 3 weeks ago
- Bypass user-land hooks by syscall tampering via the Trap Flagā135Updated 3 months ago
- ā137Updated last month
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā55Updated 8 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)ā120Updated last month
- a port of privkit bof for havocā24Updated 2 years ago
- A hoontr must hoontā101Updated last week
- Evasive Payload Delivery Server & C2 Redirectorā112Updated last month
- ā31Updated last week
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspectiveā131Updated this week
- adws enumeration bofā159Updated 2 months ago
- Lateral movement with DCOM DLL hijackingā173Updated 5 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā133Updated 5 months ago
- ā120Updated 10 months ago
- BOF with Synthetic Stackframeā194Updated last month