infoskirmish / hiveLinks
The CIA Hive source code as released by Wikileaks
☆165Updated 3 years ago
Alternatives and similar repositories for hive
Users that are interested in hive are comparing it to the libraries listed below
Sorting:
- collection of apis used in malware development☆228Updated 3 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆233Updated 8 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆256Updated last year
- Fileless attack with persistence☆360Updated 2 months ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆316Updated 3 months ago
- Conti Locker source code☆196Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- 0xpat blog☆102Updated 3 years ago
- LD_PRELOAD rootkit☆135Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆641Updated last year
- Kernel Exploits☆257Updated 4 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆254Updated 10 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆383Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆156Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆301Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆187Updated 3 weeks ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆389Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆656Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆531Updated 3 years ago
- A basic c2 / agent.☆120Updated 5 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆601Updated last year
- ☆69Updated 4 years ago
- Yet another variant of Process Hollowing☆415Updated last month
- A dynamic unpacking tool☆140Updated last year
- ☆133Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆159Updated last year
- Leaked Windows processes handles identification tool☆290Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆459Updated 3 years ago
- Performing Indirect Clean Syscalls☆574Updated 2 years ago