hideckies / hermit
A command and control framework.
☆50Updated 3 months ago
Alternatives and similar repositories for hermit:
Users that are interested in hermit are comparing it to the libraries listed below
- A collection of malware techniques.☆47Updated last week
- Automated .NET AppDomain hijack payload generation☆123Updated 2 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 3 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆47Updated 11 months ago
- Create Anti-Copy DRM Malware☆55Updated 7 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 6 months ago
- PowerShell script to generate ShellCode in various formats☆43Updated 6 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated 10 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Rex Shellcode Loader for AV/EDR evasion☆31Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆65Updated 10 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- C# havoc implant☆99Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated 10 months ago
- ☆116Updated 3 weeks ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- ☆86Updated 11 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ☆104Updated 3 weeks ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- ☆152Updated 8 months ago
- .bin file to shellcode convertor☆34Updated 9 months ago
- ☆121Updated last year