Silentsoul04 / CIA-Hacking-Tools
WikiLeaks Vault 7 CIA Hacking Tools
☆11Updated 7 years ago
Alternatives and similar repositories for CIA-Hacking-Tools:
Users that are interested in CIA-Hacking-Tools are comparing it to the libraries listed below
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Component Services Volatile Environment LPE☆11Updated 4 months ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Display Languages Volatile Environment LPE☆10Updated 4 months ago
- Nice try reading NTDLL from disk, nerd.☆18Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- ☆20Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 4 years ago
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- ☆15Updated last year
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆13Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- PoC code from blog☆16Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- ☆7Updated 5 years ago
- Unamanged PS with Named Pipes☆9Updated 4 years ago
- Spoof parent process ID☆13Updated 6 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- ☆10Updated 7 years ago