MuddyWater C2 framework research
☆12Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for PhonyC2-MuddyWater-Research
Users that are interested in PhonyC2-MuddyWater-Research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- A runtime for developing large-scale and complex shellcode.☆22Updated this week
- Python SDK for iRobot Edu robots (Root or Create 3)☆27Jun 9, 2025Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- SU for Windows☆27Apr 8, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆61Oct 24, 2025Updated 6 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- 解析netsh抓取的etl文件来定位windows主机上存在ICMP通信的进程与文件的小工具☆31Apr 22, 2022Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- IDA plugin for COM☆49Sep 30, 2022Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Frida scripts for iOS / macOS.☆21Jan 22, 2026Updated 3 months ago
- For STM32F469 (Cortex M4) with DSI : quick RFID Pwner for French VIGIK system and Common centrals.☆15Jul 3, 2016Updated 9 years ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆220Dec 17, 2025Updated 4 months ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- Repository for code for DGA Intel package.☆12Oct 6, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆30Oct 13, 2025Updated 6 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- ☆13Sep 10, 2025Updated 7 months ago
- Modular Shellcode Loader in C++☆10Apr 14, 2026Updated 3 weeks ago
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- Sleep Obfuscation☆46Oct 13, 2022Updated 3 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 2 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 10 months ago
- ☆30May 23, 2024Updated last year
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago
- The world's first truly open-source low-cost bionic arm. Developed by the Colombian Non-Governmental Organisation e-NABLE Medellín☆19Jul 22, 2020Updated 5 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Mar 12, 2026Updated last month