infoskirmish / hiveLinks
The CIA Hive source code as released by Wikileaks
☆164Updated 3 years ago
Alternatives and similar repositories for hive
Users that are interested in hive are comparing it to the libraries listed below
Sorting:
- collection of apis used in malware development☆231Updated 3 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆235Updated last year
- 0xpat blog☆109Updated 4 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆323Updated 7 months ago
- My notes while studying Windows exploitation☆192Updated 2 years ago
- ☆69Updated 4 years ago
- Fileless attack with persistence☆370Updated 6 months ago
- LD_PRELOAD rootkit☆137Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆166Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Updated 2 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆191Updated 5 months ago
- ☆134Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆648Updated 2 years ago
- A basic c2 / agent.☆120Updated 5 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆280Updated 3 months ago
- Kernel Exploits☆259Updated 4 years ago
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆613Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- Conti Locker source code☆197Updated 3 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆236Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆244Updated 2 years ago
- Manipulating and Abusing Windows Access Tokens.☆287Updated 4 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆117Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- Source code of exploiting windows API for red teaming series☆150Updated 3 years ago
- ☆153Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆438Updated last year
- Windows APT Warfare, published by Packt☆76Updated 2 years ago
- Yet another variant of Process Hollowing☆425Updated 5 months ago