hackerhouse-opensource / Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆291Updated last year
Alternatives and similar repositories for Marble:
Users that are interested in Marble are comparing it to the libraries listed below
- Analyse your malware to surgically obfuscate it☆452Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆357Updated 2 months ago
- ☆338Updated last year
- Offensive Lua.☆179Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆306Updated 2 weeks ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆628Updated 4 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆333Updated last week
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆374Updated 6 months ago
- ☆248Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆364Updated this week
- ☆132Updated last year
- Performing Indirect Clean Syscalls☆514Updated last year
- ☆297Updated 3 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆305Updated 6 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆250Updated 8 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆241Updated this week
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- ☆185Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆461Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆54Updated 5 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆132Updated last year
- ☆271Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆180Updated this week
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆350Updated 5 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆412Updated last year
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆361Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆253Updated 2 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆376Updated last year