HackLike-co / CloakLinks
Generate Secure, Polymorphic, Evasive (lol) Payloads
ā28Updated 2 months ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā95Updated last week
- ForsHopsā150Updated 9 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.ā14Updated 5 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.ā95Updated 3 weeks ago
- A collection of position independent coding resourcesā104Updated last month
- Lateral Movement Bof with MSI ODBC Driver Installā141Updated 3 months ago
- PoC framework for Sliver compilationā23Updated 11 months ago
- ā28Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+Sā¦ā98Updated last week
- ā125Updated 2 weeks ago
- ā53Updated 2 months ago
- ā135Updated 11 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flagā136Updated 4 months ago
- A python script that automates a C2 Profile buildā48Updated 2 weeks ago
- Internal Monologue BOFā78Updated last year
- ā32Updated last month
- Generate an Alphabetical Polymorphic Shellcodeā133Updated 4 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā133Updated 5 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspectiveā158Updated 3 weeks ago
- BOF with Synthetic Stackframeā204Updated 2 months ago
- A hoontr must hoontā102Updated last month
- adws enumeration bofā160Updated 2 months ago
- Local SYSTEM auth trigger for relaying - Xā155Updated 5 months ago
- ā139Updated last month
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā57Updated 8 months ago
- Terms of Use Conditional Access M365 Evilginx Phishletā43Updated 6 months ago
- ā47Updated last week
- Impersonate Tokens using only NTAPI functionsā83Updated 8 months ago
- ā136Updated last month
- Lateral movement with DCOM DLL hijackingā174Updated 5 months ago