Hive, a major component of the CIA infrastructure to control its malware.
☆17Dec 26, 2017Updated 8 years ago
Alternatives and similar repositories for cia-hive
Users that are interested in cia-hive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 2, 2023Updated 2 years ago
- Project for learning about llvm☆18Sep 13, 2022Updated 3 years ago
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- Compilador FOCA - Starter kit para a disciplina de Compiladores com roadmap de 12 etapas progressivas (flex/bison)☆14Mar 29, 2026Updated last month
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Call of Duty: Modern Warfare Remastered multiplayer mapvote☆16Sep 6, 2024Updated last year
- ssb=simple subdomain bruteforcer☆20Mar 10, 2023Updated 3 years ago
- Digital platform tailored for the educational environment, designed to facilitate the dissemination of internship opportunities and promo…☆22Apr 10, 2026Updated last month
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- 一个简单的 稳定 ICMP 传输 示例,在公网中传输可能有点慢,但很稳定,适合初学者☆11Mar 9, 2022Updated 4 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- ☆18Jun 10, 2025Updated 11 months ago
- 内存加载DLL 支持VMP最大加密☆12Aug 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Aug 22, 2022Updated 3 years ago
- ☆41Oct 16, 2025Updated 7 months ago
- A Small program punch through NAT firewalls☆12Oct 22, 2019Updated 6 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆19Dec 7, 2025Updated 5 months ago
- A tool for loading and executing PE on Windows and ELF on Linux from memory written in Rust☆14Apr 9, 2025Updated last year
- 通过agent监控执行的sql语句,对应用代码 0 侵入☆11Jan 3, 2019Updated 7 years ago
- A virtual keyboard for linux, which makes use of /dev/uinput to inject key events.☆24Mar 14, 2023Updated 3 years ago
- DOOM port for Serenity☆32Aug 1, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆14Feb 8, 2023Updated 3 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆21Dec 3, 2024Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆15Mar 21, 2022Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- Covert data exfiltration via DNS☆53Feb 8, 2025Updated last year
- Random number rootkit for the Linux kernel☆28Mar 15, 2016Updated 10 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆15Apr 15, 2024Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆61Apr 18, 2023Updated 3 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 9 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- Linux BootKit☆34Sep 11, 2017Updated 8 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- Another UEFI runtime bootkit☆37May 8, 2023Updated 3 years ago