HackLike-co / Cloak
Generate Secure, Polymorphic, Evasive Payloads
ā16Updated 3 weeks ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- A python script that automates a C2 Profile buildā41Updated last month
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā66Updated 3 weeks ago
- ForsHopsā131Updated last month
- a port of privkit bof for havocā23Updated last year
- ā44Updated last month
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā24Updated last month
- Impacket pre-compiled binariesā16Updated last year
- A C# project that builds a Web Application which redirects all HTTPSā25Updated 3 months ago
- Lifetime AMSI bypass.ā35Updated 3 weeks ago
- A collection of position independent coding resourcesā78Updated 3 months ago
- ā21Updated 11 months ago
- Windows Thread Pool Injection Havoc Implementationā29Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishletā33Updated last month
- PoC framework for Sliver compilationā14Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.ā47Updated last month
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.ā14Updated 4 months ago
- A process injection technique using only thread context manipulationā29Updated last year
- Impersonate Tokens using only NTAPI functionsā72Updated last month
- ā114Updated 2 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.ā75Updated 2 months ago
- ā29Updated 8 months ago
- AzureAD beacon object filesā119Updated 5 months ago
- ā106Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to ā¦ā27Updated 4 months ago
- Early Bird Cryo Injections ā APC-based DLL & Shellcode Injection via Pre-Frozen Job Objectsā95Updated last month
- C++ Reflective Assembly Loaderā25Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.ā77Updated 2 months ago
- ā23Updated this week
- Adversary Emulation Frameworkā98Updated 9 months ago
- ā54Updated 3 months ago