A tool to generate macOS initial access vectors using Prelude Operator payloads
☆18May 25, 2022Updated 3 years ago
Alternatives and similar repositories for iShelly
Users that are interested in iShelly are comparing it to the libraries listed below
Sorting:
- Books, advice notes, and useful lists, written for people running and working on disinformation deployments☆16Mar 11, 2021Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- ☆50Jun 28, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 10 months ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Updated this week
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- COFF and BOF Loader written in Nim☆175Aug 1, 2022Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Feb 24, 2022Updated 4 years ago
- ☆35Aug 13, 2023Updated 2 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 2 months ago
- Hiding implants in HTML files☆66Apr 5, 2020Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Automated compiler obfuscation for nim☆139Jun 27, 2022Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆78Jul 9, 2024Updated last year
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Jul 19, 2022Updated 3 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Execute ShellCode / "Inline-Assembler" in Python☆43Jan 3, 2017Updated 9 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- ☆48Jun 30, 2020Updated 5 years ago