silentwarble / HannibalLinks
Mythic C2 Agent written in x64 PIC C
☆79Updated 4 months ago
Alternatives and similar repositories for Hannibal
Users that are interested in Hannibal are comparing it to the libraries listed below
Sorting:
- ☆99Updated last year
- ☆62Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- ☆55Updated 7 months ago
- ☆49Updated last week
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 7 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆78Updated 3 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 3 months ago
- ☆125Updated 9 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆62Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- ☆96Updated 9 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- shell code example☆49Updated 3 weeks ago
- Linker for Beacon Object Files☆103Updated this week
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆49Updated last month
- ☆110Updated 6 months ago
- remote process injections using pool party techniques☆60Updated 3 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 4 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Execute dotnet app from unmanaged process☆75Updated 5 months ago
- Lateral Movement via the .NET Profiler☆82Updated 6 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated last month
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆87Updated 4 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last month