Hive solves a critical problem for the malware operators at the CIA.
☆65Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for Vault-8-Hive
Users that are interested in Vault-8-Hive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 25, 2019Updated 7 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- A collection of my shellcode samples.☆23Nov 10, 2025Updated 6 months ago
- ☆34Sep 3, 2018Updated 7 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆32Jun 14, 2022Updated 3 years ago
- ☆16May 22, 2014Updated 11 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Identify and exploit leaked handles for local privilege escalation.☆112Jun 19, 2023Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 3 years ago
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Obfuscate shared objects by hashing symbol names☆16Nov 8, 2018Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 15 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆78Oct 15, 2014Updated 11 years ago
- Headers for linking your software with ntdll.dll☆16Nov 4, 2020Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A small C library for the XChaCha20 stream cipher☆41May 27, 2023Updated 2 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 8 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Getting Envisioncollision to actually work.☆15Oct 19, 2017Updated 8 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago