MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
☆271Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for MrKaplan
Users that are interested in MrKaplan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆709Sep 26, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,474Oct 8, 2022Updated 3 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,295Feb 15, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- Replace the .txt section of the current loaded modules from \KnownDlls\☆304Sep 28, 2022Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆37Sep 26, 2023Updated 2 years ago
- Bypass Malware Time Delays☆106Sep 23, 2022Updated 3 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Feb 10, 2023Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆533Aug 1, 2022Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Nov 4, 2021Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆115Updated this week
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆629Oct 19, 2023Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆955Feb 2, 2026Updated 2 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆396Sep 26, 2023Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆445Jan 25, 2023Updated 3 years ago
- A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities☆76Sep 21, 2022Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- C# Based Universal API Unhooker☆409Feb 18, 2022Updated 4 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Persistence by writing/reading shellcode from Event Log☆380May 27, 2022Updated 3 years ago