infoskirmish / hiveLinks
The CIA Hive source code as released by Wikileaks
☆165Updated 3 years ago
Alternatives and similar repositories for hive
Users that are interested in hive are comparing it to the libraries listed below
Sorting:
- collection of apis used in malware development☆226Updated 3 years ago
- My notes while studying Windows exploitation☆188Updated 2 years ago
- 0xpat blog☆101Updated 3 years ago
- LD_PRELOAD rootkit☆134Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆232Updated 7 months ago
- Conti Locker source code☆194Updated 3 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago
- ☆133Updated 2 years ago
- Kernel Exploits☆257Updated 4 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆187Updated last week
- ☆129Updated this week
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆250Updated 9 months ago
- A dynamic unpacking tool☆137Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆256Updated last year
- APT38 Tactic PoC for Stealing 0days from security researchers☆315Updated 2 months ago
- ☆55Updated 3 years ago
- ☆68Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆79Updated 8 years ago
- Leaked Windows processes handles identification tool☆288Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆299Updated 2 years ago
- ☆135Updated 5 months ago
- Simple reverse shell to avoid Win 11 defender detection☆121Updated 3 years ago
- Windows APT Warfare, published by Packt☆71Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆83Updated 3 years ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆240Updated 2 years ago
- Source code of exploiting windows API for red teaming series☆151Updated 2 years ago