Set of PoC to abuse Windows minifilters functionality
☆76May 1, 2026Updated this week
Alternatives and similar repositories for Puzzle
Users that are interested in Puzzle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 6, 2025Updated 8 months ago
- A pointer encryption library intended for Red Team implant design in Rust.☆67Oct 1, 2025Updated 7 months ago
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- Awesome MalDev Links☆58Apr 28, 2026Updated last week
- ☆46Feb 12, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆19May 1, 2025Updated last year
- Pure Rust implementations of static Diffie-Hellman (and static elliptic-curve DH) key-exchange☆13Jan 12, 2021Updated 5 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- A Runtime Crypter in C for Linux ELF binaries.☆34Feb 18, 2026Updated 2 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 8 months ago
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆54Apr 1, 2026Updated last month
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆212Mar 4, 2026Updated 2 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆36Jul 31, 2025Updated 9 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 3 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆94Nov 6, 2025Updated 6 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆87Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- Notion C2 Profile for Mythic☆45Apr 30, 2026Updated last week
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆146Jul 2, 2025Updated 10 months ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆46Feb 19, 2026Updated 2 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated last year
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 5 months ago
- Remotely dump NT hashes through Windows Crash dumps☆33Apr 23, 2026Updated 2 weeks ago
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 10 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated 3 weeks ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- ☆53Nov 7, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 4 months ago