hackerhouse-opensource / Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆291Updated last year
Alternatives and similar repositories for Marble:
Users that are interested in Marble are comparing it to the libraries listed below
- ☆348Updated last year
- Offensive Lua.☆184Updated last year
- ☆301Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆464Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆373Updated 4 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆307Updated 8 months ago
- ☆255Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆376Updated 8 months ago
- ☆186Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆321Updated 9 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆379Updated last year
- My collection of malware dev links☆262Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆257Updated 10 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆272Updated 2 weeks ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆671Updated last month
- Performing Indirect Clean Syscalls☆535Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆514Updated 10 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆368Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆315Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆310Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆303Updated 6 months ago
- Simulate the behavior of AV/EDR for malware development training.☆519Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆433Updated last year
- Embed a payload inside a PNG file☆311Updated 6 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆441Updated this week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated 2 months ago