HackLike-co / CloakLinks
Generate Secure, Polymorphic, Evasive Payloads
ā21Updated 2 weeks ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā81Updated 3 weeks ago
- PoC framework for Sliver compilationā20Updated 7 months ago
- ForsHopsā146Updated 5 months ago
- ā25Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rustā53Updated 10 months ago
- A python script that automates a C2 Profile buildā43Updated 5 months ago
- A collection of position independent coding resourcesā92Updated 6 months ago
- ā119Updated 5 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.ā12Updated last month
- Code execution/injection technique using DLL PEB module structure manipulationā168Updated 3 months ago
- A hoontr must hoontā87Updated 3 weeks ago
- Generate an Alphabetical Polymorphic Shellcodeā109Updated 2 weeks ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā39Updated 5 months ago
- .NET assembly loader with patching AMSI and ETW bypassā29Updated 4 months ago
- AzureAD beacon object filesā126Updated 8 months ago
- Evasive Payload Delivery Server & C2 Redirectorā99Updated 3 weeks ago
- a port of privkit bof for havocā23Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā122Updated 2 months ago
- A Mythic Agent written in PIC C.ā199Updated 7 months ago
- Stage 0ā164Updated 8 months ago
- A small How-To on creating your own weaponized WSL fileā113Updated last month
- ā122Updated 7 months ago
- Lateral movement with DCOM DLL hijackingā139Updated 2 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flagā98Updated last week
- ā130Updated 5 months ago
- A PoC for Early Cascade process injection technique.ā192Updated 7 months ago
- Terms of Use Conditional Access M365 Evilginx Phishletā39Updated 2 months ago
- Early Bird Cryo Injections ā APC-based DLL & Shellcode Injection via Pre-Frozen Job Objectsā104Updated 4 months ago
- Local SYSTEM auth trigger for relayingā156Updated last month
- ā119Updated 7 months ago