☆26Feb 11, 2025Updated last year
Alternatives and similar repositories for TokenPhisher
Users that are interested in TokenPhisher are comparing it to the libraries listed below
Sorting:
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- ☆26Dec 21, 2025Updated 2 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ☆38Apr 15, 2025Updated 11 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆195Feb 16, 2026Updated last month
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆117Oct 20, 2024Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆265Nov 22, 2025Updated 3 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆126Dec 6, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆84Jan 7, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- ☆39Nov 25, 2025Updated 3 months ago