Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.
☆28May 8, 2025Updated 11 months ago
Alternatives and similar repositories for LockBit-Database-Leak-2025
Users that are interested in LockBit-Database-Leak-2025 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 4, 2025Updated last year
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated 3 weeks ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- A different approach to writing BOFs in rust.☆20Aug 20, 2025Updated 7 months ago
- Awesome MalDev Links☆57Mar 18, 2026Updated 3 weeks ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 4 months ago
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 7 months ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 17 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆70Jan 11, 2026Updated 3 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- ☆50Jun 4, 2025Updated 10 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- ☆194Jul 29, 2024Updated last year