hackerhouse-opensource / Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
☆289Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for Marble
- Analyse your malware to surgically obfuscate it☆419Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆561Updated last month
- Offensive Lua.☆175Updated last year
- ☆312Updated last year
- ☆181Updated 9 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 10 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆370Updated 3 months ago
- Tools for analyzing EDR agents☆209Updated 5 months ago
- Performing Indirect Clean Syscalls☆483Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆255Updated 2 weeks ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆296Updated 4 months ago
- Because AV evasion should be easy.☆312Updated 4 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆229Updated last week
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆131Updated 10 months ago
- ☆267Updated last year
- ☆283Updated 2 weeks ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆300Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆240Updated 5 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆315Updated 4 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆383Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆281Updated 10 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆325Updated 5 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆301Updated last year
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- AV/EDR Lab environment setup references to help in Malware development☆186Updated 3 weeks ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆201Updated 3 weeks ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆271Updated 4 months ago
- Simulate the behavior of AV/EDR for malware development training.☆455Updated 9 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆474Updated 5 months ago