A self-hosted, real-time collaborative workspace for offensive security assessments.
☆41Feb 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for chronix
Users that are interested in chronix are comparing it to the libraries listed below
Sorting:
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆58Updated this week
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆52Feb 13, 2026Updated 3 weeks ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated 2 months ago
- Unbranded content for Mercy Corps' Data Protection & Privacy Guides. For more info see https://www.mercycorps.org/research-resources/data…☆10Sep 1, 2022Updated 3 years ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆114Jan 25, 2026Updated last month
- ☆207Dec 17, 2025Updated 2 months ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆14Oct 27, 2025Updated 4 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆44Apr 27, 2023Updated 2 years ago
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- Python Shellcode 免杀加载器 支持图形化定制开发✌☆10Oct 23, 2022Updated 3 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 10 months ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆37Jan 15, 2026Updated last month
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 10 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- !3 is a simple, secure and open source paste sharing platform.☆13Feb 5, 2026Updated last month
- A bridge to launch managed applications (.NET) into MS signed exe via dll injection☆13Aug 29, 2020Updated 5 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago