infoskirmish / hive
The CIA Hive source code as released by Wikileaks
☆161Updated 3 years ago
Alternatives and similar repositories for hive:
Users that are interested in hive are comparing it to the libraries listed below
- collection of apis used in malware development☆224Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆226Updated 3 months ago
- Leaked Windows processes handles identification tool☆286Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆291Updated last year
- My notes while studying Windows exploitation☆187Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆469Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆375Updated 8 months ago
- Performing Indirect Clean Syscalls☆526Updated last year
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆350Updated last year
- Manipulating and Abusing Windows Access Tokens.☆274Updated 4 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆527Updated 3 weeks ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆200Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆218Updated last year
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆241Updated 5 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆662Updated 3 weeks ago
- GhostWriting Injection Technique.☆168Updated 7 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆307Updated 7 months ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆455Updated 3 years ago
- LD_PRELOAD rootkit☆131Updated last year
- Fileless attack with persistence☆348Updated 4 months ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆488Updated 2 years ago
- A Payload Loader Designed With Advanced Evasion Features☆509Updated 2 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆556Updated 2 years ago
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆597Updated 3 years ago
- My collection of malware dev links☆260Updated 7 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆366Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- Various Cobalt Strike BOFs☆622Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated last month
- Sleep Obfuscation☆735Updated last year