PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025
☆60Jul 16, 2025Updated 7 months ago
Alternatives and similar repositories for ShadeBIOS
Users that are interested in ShadeBIOS are comparing it to the libraries listed below
Sorting:
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- ☆20May 30, 2025Updated 9 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Documentation☆40Feb 9, 2026Updated 2 weeks ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 2 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- ☆42Jun 23, 2024Updated last year
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- ☆29Jun 18, 2025Updated 8 months ago
- vmware-backdoor☆33Jul 11, 2021Updated 4 years ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Nov 2, 2025Updated 4 months ago
- eNVMe☆61Aug 18, 2025Updated 6 months ago
- Viewer for IFR structures☆19Jun 5, 2020Updated 5 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆79Aug 3, 2025Updated 6 months ago
- ☆19Mar 24, 2017Updated 8 years ago
- ☆21Dec 16, 2024Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Jul 17, 2025Updated 7 months ago
- Repository for the edkrepo utility☆27Feb 4, 2026Updated 3 weeks ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Jul 17, 2025Updated 7 months ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Mar 13, 2020Updated 5 years ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- ☆108Aug 21, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- Cloud Pentesting Resource Collection☆34Jan 10, 2024Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆134Jul 8, 2025Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- binary instrumentation, analysis, and patching framework☆100Feb 20, 2026Updated last week
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year