infoskirmish / hiveLinks
The CIA Hive source code as released by Wikileaks
☆164Updated 3 years ago
Alternatives and similar repositories for hive
Users that are interested in hive are comparing it to the libraries listed below
Sorting:
- collection of apis used in malware development☆228Updated 3 years ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆234Updated 9 months ago
- Kernel Exploits☆259Updated 4 years ago
- 0xpat blog☆104Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆190Updated last month
- APT38 Tactic PoC for Stealing 0days from security researchers☆320Updated 3 months ago
- Conti Locker source code☆197Updated 3 years ago
- ☆69Updated 4 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆643Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆156Updated 2 years ago
- LD_PRELOAD rootkit☆138Updated last year
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆614Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆226Updated 2 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆257Updated 11 months ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆242Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Fileless attack with persistence☆361Updated 3 months ago
- Yet another variant of Process Hollowing☆418Updated last month
- A basic c2 / agent.☆121Updated 5 years ago
- Leaked Windows processes handles identification tool☆288Updated 3 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆225Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆551Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Updated last year
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆604Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆302Updated 2 years ago
- ☆133Updated 2 years ago