Generate Secure, Polymorphic, Evasive (lol) Payloads
☆29Oct 2, 2025Updated 4 months ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 2 months ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆69Updated this week
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- A simple website to act as a store for havoc modules and extensions☆28Jan 20, 2025Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- ☆48Oct 14, 2025Updated 4 months ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆137Apr 6, 2025Updated 10 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- ☆17Jan 9, 2025Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Updated this week
- The Official Sliver Armory☆134Apr 17, 2025Updated 10 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Dec 24, 2025Updated 2 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆13Mar 3, 2025Updated 11 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- ☆18Sep 1, 2025Updated 6 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ☆109Oct 29, 2024Updated last year