Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
☆68Apr 10, 2022Updated 4 years ago
Alternatives and similar repositories for PT-ToolKit
Users that are interested in PT-ToolKit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆43Sep 3, 2020Updated 5 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 3 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows AppLocker Driver (appid.sys) LPE☆78Jul 29, 2024Updated last year
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆42Jun 23, 2024Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 6 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Sep 29, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Jul 22, 2021Updated 4 years ago
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆130Apr 22, 2026Updated 2 weeks ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 5 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 3 years ago
- Execute an arbitrary command within the context of another process☆20Jun 28, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Dec 12, 2020Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆83Nov 28, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆488Jul 12, 2023Updated 2 years ago