Templating with sinister modules
☆16Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for Blueprint
Users that are interested in Blueprint are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- x86 Homebrew'd Kernel☆10Jul 22, 2020Updated 5 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- ☆14Mar 30, 2022Updated 3 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- ☆10Nov 24, 2018Updated 7 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- C# port of chm lib☆24Sep 7, 2011Updated 14 years ago
- Docker-container that connects to OpenVPN-server and provides SOCKS5-proxy for easy application-specific VPN-tunneling☆26May 10, 2021Updated 4 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated last month
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- ☆62Feb 12, 2026Updated last month
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- Compiles Windows resource files (.rc) into a Rust program.☆31Feb 26, 2021Updated 5 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago