Templating with sinister modules
☆16Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for Blueprint
Users that are interested in Blueprint are comparing it to the libraries listed below
Sorting:
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- x86 Homebrew'd Kernel☆10Jul 22, 2020Updated 5 years ago
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- ☆20Nov 1, 2022Updated 3 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Docker-container that connects to OpenVPN-server and provides SOCKS5-proxy for easy application-specific VPN-tunneling☆26May 10, 2021Updated 4 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- C# port of chm lib☆24Sep 7, 2011Updated 14 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago