cbrnrd / malikethLinks
🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python
☆45Updated last year
Alternatives and similar repositories for maliketh
Users that are interested in maliketh are comparing it to the libraries listed below
Sorting:
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 10 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆47Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆92Updated 4 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆50Updated 10 months ago
- converts sRDI compatible dlls to shellcode☆29Updated 5 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆53Updated last year
- Various methods of executing shellcode☆71Updated 2 years ago
- ☆34Updated 6 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆71Updated 8 months ago
- ☆40Updated 4 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆63Updated 4 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated 11 months ago
- ☆36Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆43Updated 11 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- shell code example☆49Updated last month
- ☆23Updated 4 months ago
- Windows C++ Implant for Exploration C2☆35Updated last month
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 8 months ago
- Splitting and executing shellcode across multiple pages☆102Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 8 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Updated 11 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Sleep Obfuscation☆45Updated 2 years ago
- API Hammering with C++20☆49Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year