1N73LL1G3NC3x / NightmangleLinks
☆160Updated last year
Alternatives and similar repositories for Nightmangle
Users that are interested in Nightmangle are comparing it to the libraries listed below
Sorting:
- Our Tips&Tricks☆126Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Amazing whoami alternatives☆141Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Chrome browser extension-based Command & Control☆173Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆197Updated 6 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- ☆105Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆225Updated 4 months ago
- Evasive Golang Loader☆135Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆82Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 2 months ago
- ☆71Updated 6 months ago
- 「💀」Proof of concept on BYOVD attack☆163Updated 9 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- ☆164Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 8 months ago