hackerhouse-opensource / MarbleLinks
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆318Updated 2 years ago
Alternatives and similar repositories for Marble
Users that are interested in Marble are comparing it to the libraries listed below
Sorting:
- Offensive Lua.☆221Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆517Updated last month
- RunPE implementation with multiple evasive techniques (1)☆378Updated 2 years ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- ☆189Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆270Updated last year
- Venom is a library that meant to perform evasive communication using stolen browser socket☆396Updated 2 years ago
- ☆164Updated 10 months ago
- Inject DLLs into the explorer process using icons☆399Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆336Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 4 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆398Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 8 months ago
- ☆333Updated 4 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆202Updated 10 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year
- ☆133Updated 2 years ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Updated 5 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆269Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆407Updated 2 weeks ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆299Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- ☆156Updated 9 months ago