NSecSoftBYOVD POC
☆58Feb 12, 2026Updated 2 months ago
Alternatives and similar repositories for NSecSoftBYOVD
Users that are interested in NSecSoftBYOVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆62Feb 12, 2026Updated 2 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 2 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- BYOVD Technique Example using viragt64 driver☆81Jul 25, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- HVNC PoC (Hidden VNC) in Rust☆41Sep 2, 2025Updated 7 months ago
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆47Apr 1, 2026Updated 2 weeks ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆232Nov 6, 2025Updated 5 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆59Feb 19, 2026Updated last month
- Simulate per-process disconnection in red team environments☆113Jun 6, 2025Updated 10 months ago
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆49Feb 28, 2026Updated last month
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Updated this week
- A Rust template for writing Beacon Object Files (BOFs)☆124Feb 11, 2026Updated 2 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆88Jun 4, 2024Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆296Nov 1, 2025Updated 5 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆94Jan 2, 2026Updated 3 months ago
- Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files …☆28Apr 3, 2024Updated 2 years ago
- 极安·斥候(Choo)远程自动化信息收集与风险评估系统☆21Apr 7, 2024Updated 2 years ago
- Group Policy Objects manipulation and exploitation framework☆299Dec 7, 2025Updated 4 months ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated 2 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- kernel callback removal (Bypassing EDR Detections)☆214Nov 14, 2025Updated 5 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- ☆42Jun 23, 2024Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year