infoskirmish / hive
The CIA Hive source code as released by Wikileaks
☆158Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for hive
- Conti Locker source code☆184Updated 2 years ago
- My notes while studying Windows exploitation☆184Updated last year
- collection of apis used in malware development☆221Updated 2 years ago
- ☆64Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆223Updated 4 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆216Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆623Updated last year
- simple Windows handle hijacker with a nod to Apxaey for inspiration☆201Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆238Updated last year
- 0xpat blog☆97Updated 3 years ago
- A C2 framework for initial access in Go☆172Updated 2 years ago
- Sleep Obfuscation☆686Updated 11 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆631Updated 8 months ago
- Leaked Windows processes handles identification tool☆272Updated 2 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆228Updated 3 weeks ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆314Updated 2 weeks ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆498Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆371Updated 3 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆234Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆685Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆563Updated last year
- ☆123Updated last year
- Kernel Exploits☆243Updated 3 years ago
- A dynamic unpacking tool☆128Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆175Updated last year
- ☆131Updated last year
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆566Updated 2 years ago