NSecSoftBYOVD POC
☆59Feb 12, 2026Updated 2 months ago
Alternatives and similar repositories for NSecSoftBYOVD
Users that are interested in NSecSoftBYOVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆62Feb 12, 2026Updated 2 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- BYOVD Technique Example using viragt64 driver☆82Jul 25, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- HVNC PoC (Hidden VNC) in Rust☆41Sep 2, 2025Updated 8 months ago
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆232Nov 6, 2025Updated 6 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆51Feb 23, 2026Updated 2 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆54Apr 1, 2026Updated last month
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆59Feb 19, 2026Updated 2 months ago
- Simulate per-process disconnection in red team environments☆114Jun 6, 2025Updated 11 months ago
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- ExportHider: Generating Export Table during Runtime to Hide the Exported Functions from the DLL File.☆31Apr 12, 2026Updated 3 weeks ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆63Apr 29, 2026Updated last week
- A Rust template for writing Beacon Object Files (BOFs)☆126Feb 11, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆90Jun 4, 2024Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆298Nov 1, 2025Updated 6 months ago
- Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files …☆30Apr 3, 2024Updated 2 years ago
- 极安·斥候(Choo)远程自动化信息收集与风险评估系统☆21Apr 7, 2024Updated 2 years ago
- Group Policy Objects manipulation and exploitation framework☆304Dec 7, 2025Updated 5 months ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated 2 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆96Jan 2, 2026Updated 4 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆25Aug 2, 2025Updated 9 months ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- kernel callback removal (Bypassing EDR Detections)☆216Nov 14, 2025Updated 5 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆129Jan 26, 2026Updated 3 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- ☆42Jun 23, 2024Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year