LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.
☆199Feb 19, 2025Updated last year
Alternatives and similar repositories for LOLAPPS
Users that are interested in LOLAPPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆526Feb 25, 2026Updated last month
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆127Updated this week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated last month
- ☆128Jun 28, 2023Updated 2 years ago
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,061Oct 14, 2025Updated 5 months ago
- Living Off The Land Drivers☆1,428Mar 13, 2026Updated last week
- Remote operations commands implemented using Beacon Object Files☆1,139Mar 5, 2026Updated 2 weeks ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆185Nov 10, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- ☆319Jun 28, 2023Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆68Aug 31, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,934Jan 20, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Aug 2, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆619Feb 5, 2026Updated last month
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Using fibers to run in-memory code.☆243Oct 19, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆223Mar 10, 2024Updated 2 years ago