Hive solves a critical problem for the malware operators at the CIA.
☆66Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for Vault-8-Hive
Users that are interested in Vault-8-Hive are comparing it to the libraries listed below
Sorting:
- ☆17Mar 25, 2019Updated 6 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- A collection of my shellcode samples.☆21Nov 10, 2025Updated 4 months ago
- ☆34Sep 3, 2018Updated 7 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆81Jun 11, 2018Updated 7 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆16May 22, 2014Updated 11 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Obfuscate shared objects by hashing symbol names☆16Nov 8, 2018Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆78Oct 15, 2014Updated 11 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A small C library for the XChaCha20 stream cipher☆40May 27, 2023Updated 2 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Getting Envisioncollision to actually work.☆15Oct 19, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago