Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.
☆39Jan 2, 2025Updated last year
Alternatives and similar repositories for CheckPlz
Users that are interested in CheckPlz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Oct 13, 2025Updated 6 months ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,412Updated this week
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 10 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- MCP server for Atomic Red Team☆123May 1, 2026Updated last week
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 4 years ago
- ysoserial.net docker image☆30Sep 23, 2024Updated last year
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆16May 16, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Offensive Linux tool for network attacks. Built from the ground with only C.☆13May 1, 2021Updated 5 years ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆56Sep 24, 2025Updated 7 months ago
- ☆31May 16, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆55Sep 19, 2025Updated 7 months ago
- μBlaze Architecture Plugin for Binary Ninja☆11May 29, 2022Updated 3 years ago
- Remote DLL Injection with Timer-based Shellcode Execution☆208Jul 18, 2025Updated 9 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆321Dec 29, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Oct 21, 2023Updated 2 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 5 months ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆57Updated this week
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 6 months ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- Windows Application Attack Surface Analyzer☆25Feb 22, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆19Sep 9, 2025Updated 8 months ago
- ☆26Feb 11, 2025Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆39Jan 7, 2025Updated last year
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated last year