Rehashing APIs to prevent hash based detection
☆14Jan 7, 2025Updated last year
Alternatives and similar repositories for Havoc_Demon_API_Hashing
Users that are interested in Havoc_Demon_API_Hashing are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- ☆26Mar 6, 2025Updated 11 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 7 months ago
- ☆20Feb 6, 2024Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Collection of red team techniques.☆67Apr 25, 2025Updated 10 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Dec 23, 2023Updated 2 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Apr 21, 2025Updated 10 months ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year