infoskirmish / hive
The CIA Hive source code as released by Wikileaks
☆162Updated 3 years ago
Alternatives and similar repositories for hive
Users that are interested in hive are comparing it to the libraries listed below
Sorting:
- collection of apis used in malware development☆223Updated 2 years ago
- Fileless attack with persistence☆352Updated 5 months ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 5 months ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆360Updated 3 years ago
- Conti Locker source code☆192Updated 3 years ago
- LD_PRELOAD rootkit☆132Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆222Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆639Updated last year
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆605Updated 3 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆474Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- Sleep Obfuscation☆755Updated last year
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆243Updated 6 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆660Updated last year
- ☆132Updated last year
- ☆135Updated 2 months ago
- Kernel Exploits☆252Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆462Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆679Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆535Updated 2 weeks ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆458Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆609Updated 2 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆560Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆636Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆377Updated 9 months ago
- Manipulating and Abusing Windows Access Tokens.☆276Updated 4 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆533Updated last year
- 0xpat blog☆100Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆738Updated 3 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago