cbrnrd / malikethLinks
π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python
β45Updated last year
Alternatives and similar repositories for maliketh
Users that are interested in maliketh are comparing it to the libraries listed below
Sorting:
- a demo module for the kaine agent to execute and inject assembly modulesβ38Updated 9 months ago
- β31Updated 5 months ago
- Shellcode Loader Utilizing ETW Eventsβ63Updated 3 months ago
- converts sRDI compatible dlls to shellcodeβ29Updated 4 months ago
- shell code exampleβ49Updated 2 weeks ago
- Reimplementation of the KExecDD DSE bypass technique.β46Updated 8 months ago
- β36Updated 2 years ago
- ForsHopsβ53Updated 2 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged userβ39Updated 9 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.β47Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β64Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.β61Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β70Updated last year
- Windows C++ Implant for Exploration C2β31Updated last week
- Boilerplate to develop raw and truly Position Independent Code (PIC).β51Updated 4 months ago
- Execute dotnet app from unmanaged processβ75Updated 5 months ago
- Exploiting the KsecDD Windows driver through Server Silosβ71Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β73Updated 9 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β77Updated 3 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loaderβ48Updated last year
- Callstack spoofing using a VEH because VEH all the things.β21Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ70Updated last year
- β99Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.β69Updated 2 years ago
- A POC of a new βthreadlessβ process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and reβ¦β24Updated last year
- Unhook Ntdll.dll, Go & C++.β22Updated last month
- Section-based payload obfuscation technique for x64β59Updated 9 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial β¦β49Updated 4 months ago
- β36Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assemblyβ60Updated last year