abougouffa / cia-hiveView external linksLinks
Hive, a major component of the CIA infrastructure to control its malware.
☆17Dec 26, 2017Updated 8 years ago
Alternatives and similar repositories for cia-hive
Users that are interested in cia-hive are comparing it to the libraries listed below
Sorting:
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- ☆12Feb 4, 2025Updated last year
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- DeepLocker - Deep learning based malware☆34Nov 7, 2018Updated 7 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Reborn cscope extension for emacs☆10Apr 21, 2024Updated last year
- BYOVD Technique Example using viragt64 driver☆68Jul 25, 2024Updated last year
- Similar Song Recommendation with Python☆13Feb 10, 2024Updated 2 years ago
- Python-built Multilayer Perceptron, a personal project utilizing Keras-TensorFlow for advanced artificial neural network modeling☆13Nov 20, 2023Updated 2 years ago
- first zig orderbook in history // benchmark prolly wrong its ai estimate☆14Dec 23, 2025Updated last month
- automating the zig release process☆11Nov 19, 2025Updated 2 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆13Jan 6, 2024Updated 2 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- A tool for loading and executing PE on Windows and ELF on Linux from memory written in Rust☆12Apr 9, 2025Updated 10 months ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- A simple and efficient TPU (Transaction Processing Unit) client for Solana, utilizing the QUIC protocol for data transmission.☆21Dec 14, 2024Updated last year
- ☆12Jul 2, 2023Updated 2 years ago
- Rust implementation of POST proving☆13Dec 15, 2025Updated last month
- Runtime components for use with basedmypy☆11Nov 21, 2024Updated last year
- A full-stack for indexing DEX trades on Solana using Yellowstone GRPC and Timescale.☆13Feb 4, 2025Updated last year
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- dired + fp☆13Dec 25, 2025Updated last month
- A networking framework built on top of MQTT to allow the communication and synchronization of distributed, language-independent resources…☆11Feb 28, 2024Updated last year
- Generate C++ method implementations from declarations☆17Aug 5, 2025Updated 6 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated 11 months ago
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- 👻☆12Updated this week
- A Small program punch through NAT firewalls☆12Oct 22, 2019Updated 6 years ago
- Spacemesh command-line tool☆10Nov 21, 2025Updated 2 months ago
- ☆12Nov 20, 2025Updated 2 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆58Apr 18, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A different approach to writing BOFs in rust.☆18Aug 20, 2025Updated 5 months ago
- Obtain robust odometry from your noisy panoramic 2D LIDAR [IROS'22]☆21Dec 20, 2025Updated last month
- Visual bell for GNU Emacs☆20Oct 20, 2021Updated 4 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago