hideckies / hermit
A command and control framework.
☆35Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for hermit
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆84Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆82Updated 5 months ago
- ApexLdr is a DLL Payload Loader written in C☆104Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆52Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated 2 months ago
- ☆125Updated 3 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆55Updated 3 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆75Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 7 months ago
- ☆109Updated 7 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆63Updated last year
- A bunch of scripts and code i wrote.☆132Updated 2 weeks ago
- Template-based generation of shellcode loaders☆67Updated 7 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆78Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆41Updated 8 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆77Updated 3 weeks ago
- ☆118Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆113Updated last year
- Sleep obfuscation☆144Updated 2 weeks ago
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 8 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated 9 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 5 months ago