Extension functionality for the NightHawk operator client
☆26Nov 3, 2023Updated 2 years ago
Alternatives and similar repositories for DayBird
Users that are interested in DayBird are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- ☆146Nov 6, 2025Updated 3 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- A C# SSH client☆74Jan 29, 2024Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆129May 9, 2021Updated 4 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆64May 31, 2024Updated last year
- ☆152Oct 2, 2023Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Swiss army knife for payload encryption and obfuscation☆28Jan 22, 2024Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago