A catalog of glob-based command obfuscation for Linux · macOS · Windows CMD/PowerShell
☆149Mar 14, 2026Updated last month
Alternatives and similar repositories for LOLGlobs
Users that are interested in LOLGlobs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Sep 4, 2024Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Living Off The Land API☆59Feb 2, 2026Updated 3 months ago
- ☆24Sep 6, 2025Updated 8 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆41Nov 11, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- This cheatsheet maps common impacket workflows to their modern alternatives☆222Apr 21, 2026Updated 2 weeks ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆78Dec 15, 2025Updated 4 months ago
- Dump Kerberos tickets☆46Aug 4, 2025Updated 9 months ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆57Mar 2, 2026Updated 2 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 5 months ago
- Some V8 n-day exploits that I've written☆55Mar 1, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- Living off the False Positive!☆42Apr 3, 2026Updated last month
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆113Dec 28, 2025Updated 4 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆69Nov 15, 2025Updated 5 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 8 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆76Aug 31, 2023Updated 2 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆145Mar 8, 2026Updated 2 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack…☆69Apr 15, 2026Updated 3 weeks ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- Notion C2 Profile for Mythic☆45Apr 30, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆228Mar 13, 2026Updated last month
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 4 months ago
- ☆38Feb 26, 2019Updated 7 years ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated last year
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆46Jun 23, 2025Updated 10 months ago