hackerhouse-opensource / MarbleLinks
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆301Updated last year
Alternatives and similar repositories for Marble
Users that are interested in Marble are comparing it to the libraries listed below
Sorting:
- ☆359Updated last year
- Analyse your malware to surgically obfuscate it☆485Updated 2 months ago
- Offensive Lua.☆191Updated last year
- ☆302Updated 9 months ago
- ☆188Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆399Updated 2 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆292Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆243Updated last week
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆324Updated 2 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆184Updated 5 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 11 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆380Updated last year
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆167Updated 4 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆386Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆262Updated 8 months ago
- My collection of malware dev links☆280Updated last month
- Embed a payload inside a PNG file☆334Updated 9 months ago
- ☆160Updated 5 months ago
- AV/EDR Lab environment setup references to help in Malware development☆397Updated 5 months ago
- ☆133Updated last year
- ☆143Updated last month
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 11 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆261Updated last year
- Tools for analyzing EDR agents☆238Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆328Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆295Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆315Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆707Updated 4 months ago