A self-hosted, real-time collaborative workspace for offensive security assessments.
☆41Feb 20, 2026Updated last month
Alternatives and similar repositories for chronix
Users that are interested in chronix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆60Mar 1, 2026Updated 3 weeks ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆76Dec 10, 2025Updated 3 months ago
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 4 months ago
- Zero-trust encrypted vault with cryptographic plausible deniability. Duress-proof storage for activists, journalists, and whistleblowers.…☆42Jan 9, 2026Updated 2 months ago
- ☆17Nov 18, 2025Updated 4 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated 2 months ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Unbranded content for Mercy Corps' Data Protection & Privacy Guides. For more info see https://www.mercycorps.org/research-resources/data…☆10Sep 1, 2022Updated 3 years ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 3 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- ☆39Mar 31, 2025Updated 11 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Mar 10, 2026Updated 2 weeks ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Jekyll template for presentations with reveal.js☆28Oct 18, 2014Updated 11 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- MacOS App Icons & Dock-Optimized Folder Icons☆16May 24, 2025Updated 10 months ago
- ☆216Dec 17, 2025Updated 3 months ago
- !3 is a simple, secure and open source paste sharing platform.☆13Feb 5, 2026Updated last month
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated 2 weeks ago
- Demo Laravel application containing functional two-factor authentication.☆11Nov 3, 2018Updated 7 years ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆209Jan 6, 2026Updated 2 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- ☆15Oct 1, 2024Updated last year
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆83Mar 18, 2026Updated last week
- Automatically parse LTE-Pcap-files (Wireshark) and show the position of the eNodeB (BaseStation) on a map. The project uses the API of op…☆10May 16, 2017Updated 8 years ago