Hive solves a critical problem for the malware operators at the CIA.
☆65Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for Vault-8-Hive
Users that are interested in Vault-8-Hive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 25, 2019Updated 7 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆34Sep 3, 2018Updated 7 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆32Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆16May 22, 2014Updated 11 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Identify and exploit leaked handles for local privilege escalation.☆112Jun 19, 2023Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 3 years ago
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Obfuscate shared objects by hashing symbol names☆16Nov 8, 2018Updated 7 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆78Oct 15, 2014Updated 11 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A small C library for the XChaCha20 stream cipher☆41May 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 8 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Getting Envisioncollision to actually work.☆15Oct 19, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago