HackLike-co / CloakLinks
Generate Secure, Polymorphic, Evasive (lol) Payloads
ā27Updated last month
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā87Updated this week
- PoC framework for Sliver compilationā23Updated 10 months ago
- ForsHopsā150Updated 7 months ago
- A collection of position independent coding resourcesā94Updated 2 months ago
- A python script that automates a C2 Profile buildā48Updated 2 months ago
- ā26Updated last year
- ā121Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.ā13Updated 4 months ago
- ā135Updated 9 months ago
- Lateral Movement Bof with MSI ODBC Driver Installā134Updated last month
- Internal Monologue BOFā79Updated 10 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rustā54Updated last year
- Generate an Alphabetical Polymorphic Shellcodeā130Updated 2 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flagā131Updated 2 months ago
- ā53Updated last month
- ā30Updated 2 weeks ago
- adws enumeration bofā154Updated last month
- ā45Updated last month
- Evasive Payload Delivery Server & C2 Redirectorā110Updated last week
- AzureAD beacon object filesā131Updated 10 months ago
- a port of privkit bof for havocā24Updated last year
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)ā104Updated 3 weeks ago
- BOF with Synthetic Stackframeā182Updated 2 weeks ago
- A hoontr must hoontā101Updated 3 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pā¦ā166Updated this week
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.ā69Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā53Updated 7 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy ā ideal for BYOVD scenarios.ā72Updated 3 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā131Updated 4 months ago
- Local SYSTEM auth trigger for relaying - Xā152Updated 3 months ago