SubSeven Legacy Official Source Code Repository
☆633Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for SubSeven
Users that are interested in SubSeven are comparing it to the libraries listed below
Sorting:
- User-friendly Microsoft Windows Debugger for Malware Analysts.☆204Nov 15, 2022Updated 3 years ago
- ☆18Nov 9, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features.☆253Jun 12, 2024Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,497Dec 21, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- ☆1,073May 18, 2024Updated last year
- Video Player using FFMPEG dlls in Object Pascal for Delphi☆17Jan 6, 2023Updated 3 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆330Jul 15, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆75Dec 25, 2022Updated 3 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,154Nov 9, 2023Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- An advanced tool for working with access tokens and Windows security policy.☆635Updated this week
- Venom is a library that meant to perform evasive communication using stolen browser socket☆396Sep 26, 2023Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,274Feb 15, 2026Updated 2 weeks ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Feb 2, 2026Updated last month
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆268Oct 15, 2024Updated last year
- Playing with 2d constaints☆13Jan 26, 2026Updated last month
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆936Mar 29, 2022Updated 3 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆833Jul 2, 2024Updated last year
- A modern 32/64-bit position independent implant template☆1,295Mar 21, 2025Updated 11 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,051Oct 14, 2025Updated 4 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- ☆1,787Aug 30, 2024Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆900Jan 21, 2025Updated last year
- A multi-purpose logviewer☆63Dec 30, 2025Updated 2 months ago
- HVNC for Cobalt Strike☆1,301Dec 7, 2023Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆714Mar 4, 2023Updated 3 years ago
- Using WebGPU from Delphi☆29Apr 20, 2025Updated 10 months ago