0xSojalSec / agarthaView external linksLinks
a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to spot authentication/authorization issues, and converts Http requests to Javascript for further XSS exploitation and more.
☆15Apr 25, 2022Updated 3 years ago
Alternatives and similar repositories for agartha
Users that are interested in agartha are comparing it to the libraries listed below
Sorting:
- ☆10Jul 1, 2023Updated 2 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A python polymorphic engine for C programs☆12Dec 8, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- bring your own clean ntdll (or other MS dlls)☆28Jul 14, 2025Updated 7 months ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 8 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17May 6, 2024Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 3 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- From C to binary shellcode converter.☆52Nov 11, 2025Updated 3 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Oct 17, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 2 weeks ago
- Reverse SSH C2☆28Sep 19, 2025Updated 4 months ago
- 🚨 Generate and explore malicious QR codes for cybersecurity education and authorized penetration testing to enhance digital security awa…☆26Updated this week
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- A Powerful XSS,RXSS,BXSS finding tool☆30Oct 29, 2025Updated 3 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Sep 19, 2024Updated last year
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- RE for champions☆15Jan 28, 2026Updated 2 weeks ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 3 months ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- MATLAB GUI that computes the required epicycles to match a custom drawing by using DFTs☆10Oct 5, 2020Updated 5 years ago
- A simple proof-of-concept ARP Spoofing package☆12Nov 24, 2011Updated 14 years ago