hackerhouse-opensource / MarbleLinks
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆304Updated last year
Alternatives and similar repositories for Marble
Users that are interested in Marble are comparing it to the libraries listed below
Sorting:
- ☆363Updated last year
- Analyse your malware to surgically obfuscate it☆497Updated 3 months ago
- Offensive Lua.☆194Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆59Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆327Updated 4 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆405Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆268Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆297Updated 5 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆188Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated 2 weeks ago
- ☆324Updated last week
- ☆188Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆123Updated 8 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆390Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆179Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆263Updated 9 months ago
- ☆156Updated 3 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆223Updated 4 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆257Updated 4 months ago
- ☆161Updated 6 months ago
- ☆153Updated 4 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- Embed a payload inside a PNG file☆347Updated 10 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆199Updated 5 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆384Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆283Updated last month
- ☆69Updated 7 months ago
- AV/EDR Lab environment setup references to help in Malware development☆401Updated 7 months ago
- ☆134Updated 2 years ago